General

  • Target

    2b96de2fd76b6363227c5c879be99454f821f1e5a57d017085ff812d99bae578N.exe

  • Size

    34KB

  • Sample

    250121-m8faeazqcz

  • MD5

    d7af72d812fda2c92f31cd08d10a30b0

  • SHA1

    ece082e5df53872b762da58698e45cca9dfd0543

  • SHA256

    2b96de2fd76b6363227c5c879be99454f821f1e5a57d017085ff812d99bae578

  • SHA512

    bfdf11fc1f4b065ff3dc87db0423711327bf594bf7b42b008f07b1f09015f78732a7df7700999494a74bd13df04187099e3027105f2ec4850dd47899f8a67ee1

  • SSDEEP

    768:qp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Ji:qpYoX58z1uirL98xMWnT0OQ9Ji

Malware Config

Targets

    • Target

      2b96de2fd76b6363227c5c879be99454f821f1e5a57d017085ff812d99bae578N.exe

    • Size

      34KB

    • MD5

      d7af72d812fda2c92f31cd08d10a30b0

    • SHA1

      ece082e5df53872b762da58698e45cca9dfd0543

    • SHA256

      2b96de2fd76b6363227c5c879be99454f821f1e5a57d017085ff812d99bae578

    • SHA512

      bfdf11fc1f4b065ff3dc87db0423711327bf594bf7b42b008f07b1f09015f78732a7df7700999494a74bd13df04187099e3027105f2ec4850dd47899f8a67ee1

    • SSDEEP

      768:qp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Ji:qpYoX58z1uirL98xMWnT0OQ9Ji

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks