General

  • Target

    00780717a0350d74c06b227f236f6826c4b53c19ca7e1a99187c6c11dd905fa9N.exe

  • Size

    110KB

  • Sample

    250122-b3mxhsskdl

  • MD5

    48a3a08044fa7ed5977a394530b35a10

  • SHA1

    688c3ae2e015671d157e25563ceb9b0f6a1d4306

  • SHA256

    00780717a0350d74c06b227f236f6826c4b53c19ca7e1a99187c6c11dd905fa9

  • SHA512

    35d115cefb1a41d7161761dc26a937d8a7ca759041d69b9c54132731cdb749d9d33b0f50ee1c0fd60aa201fe4fb8f7c215708741fb761f107fd3810b529fa12e

  • SSDEEP

    1536:AiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:AiyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      00780717a0350d74c06b227f236f6826c4b53c19ca7e1a99187c6c11dd905fa9N.exe

    • Size

      110KB

    • MD5

      48a3a08044fa7ed5977a394530b35a10

    • SHA1

      688c3ae2e015671d157e25563ceb9b0f6a1d4306

    • SHA256

      00780717a0350d74c06b227f236f6826c4b53c19ca7e1a99187c6c11dd905fa9

    • SHA512

      35d115cefb1a41d7161761dc26a937d8a7ca759041d69b9c54132731cdb749d9d33b0f50ee1c0fd60aa201fe4fb8f7c215708741fb761f107fd3810b529fa12e

    • SSDEEP

      1536:AiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:AiyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks