General

  • Target

    49616b669ede0d88f952af00531ebec3351414ff965dfeff5b0964b4ac838049N.exe

  • Size

    45KB

  • Sample

    250122-3jsgfa1mfs

  • MD5

    e5ac534d585e4927dfee419a9d8af880

  • SHA1

    ce14019809a7e30822577bba69272eab20b85d09

  • SHA256

    49616b669ede0d88f952af00531ebec3351414ff965dfeff5b0964b4ac838049

  • SHA512

    7bce5c72e466b112ffe4c8e5a28c23563ee6772dbc07f25b32fca4caa20902666edffd8e0e8e2f9c74c3c00cdfb1d1d2d0e193b3fa0b321fc0af0de16010eb17

  • SSDEEP

    768:yhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ21:+sWE9N5dFu53dsniQaB/xZ14n7zIF+qZ

Malware Config

Targets

    • Target

      49616b669ede0d88f952af00531ebec3351414ff965dfeff5b0964b4ac838049N.exe

    • Size

      45KB

    • MD5

      e5ac534d585e4927dfee419a9d8af880

    • SHA1

      ce14019809a7e30822577bba69272eab20b85d09

    • SHA256

      49616b669ede0d88f952af00531ebec3351414ff965dfeff5b0964b4ac838049

    • SHA512

      7bce5c72e466b112ffe4c8e5a28c23563ee6772dbc07f25b32fca4caa20902666edffd8e0e8e2f9c74c3c00cdfb1d1d2d0e193b3fa0b321fc0af0de16010eb17

    • SSDEEP

      768:yhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ21:+sWE9N5dFu53dsniQaB/xZ14n7zIF+qZ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks