General

  • Target

    9492ab9274aa8e314ccbf432346021a80931f4fdc4f8838489838b8c4ee951b3.exe

  • Size

    110KB

  • Sample

    250123-cvxx7axnbw

  • MD5

    bb57811673cedb79c1c4c5c23c01c051

  • SHA1

    9160ff2e81922ba7483fbaaf6cf549642a561e29

  • SHA256

    9492ab9274aa8e314ccbf432346021a80931f4fdc4f8838489838b8c4ee951b3

  • SHA512

    7071d691dec8de9ec9539bb31152b6fc3fcce91a2a47ba8393a1b99299c497e132d688e7b92a50912372d8a4ae1f7a17f8f568535fd86be4d31d94fc5d1d6ca7

  • SSDEEP

    1536:viLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:viyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      9492ab9274aa8e314ccbf432346021a80931f4fdc4f8838489838b8c4ee951b3.exe

    • Size

      110KB

    • MD5

      bb57811673cedb79c1c4c5c23c01c051

    • SHA1

      9160ff2e81922ba7483fbaaf6cf549642a561e29

    • SHA256

      9492ab9274aa8e314ccbf432346021a80931f4fdc4f8838489838b8c4ee951b3

    • SHA512

      7071d691dec8de9ec9539bb31152b6fc3fcce91a2a47ba8393a1b99299c497e132d688e7b92a50912372d8a4ae1f7a17f8f568535fd86be4d31d94fc5d1d6ca7

    • SSDEEP

      1536:viLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:viyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks