General

  • Target

    25e985f14763e73784c97a6f02e7a6c6ca7224b35b097675151c165ea9eae692N.exe

  • Size

    89KB

  • Sample

    250124-a2zdgs1lg1

  • MD5

    c16decd805397cd85743e70c8f0ebee0

  • SHA1

    37200b973a0c7229983538c28eb1e7a3bab21ab6

  • SHA256

    25e985f14763e73784c97a6f02e7a6c6ca7224b35b097675151c165ea9eae692

  • SHA512

    86bea05f79a0b702d5d59722c6613419b8cdeae71d5942c2cabd668ece886863e1241b2c534bfbdb82655a5d4be89c4c57325bcbdf0d2daf970705bf98c0773e

  • SSDEEP

    1536:f1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7a:d+4MJIkLZJNAQ9Jo9a

Malware Config

Targets

    • Target

      25e985f14763e73784c97a6f02e7a6c6ca7224b35b097675151c165ea9eae692N.exe

    • Size

      89KB

    • MD5

      c16decd805397cd85743e70c8f0ebee0

    • SHA1

      37200b973a0c7229983538c28eb1e7a3bab21ab6

    • SHA256

      25e985f14763e73784c97a6f02e7a6c6ca7224b35b097675151c165ea9eae692

    • SHA512

      86bea05f79a0b702d5d59722c6613419b8cdeae71d5942c2cabd668ece886863e1241b2c534bfbdb82655a5d4be89c4c57325bcbdf0d2daf970705bf98c0773e

    • SSDEEP

      1536:f1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7a:d+4MJIkLZJNAQ9Jo9a

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks