General

  • Target

    7181d8c6e8f9b2fdafd5017407bba96ca87ef031f423880e3c513a96aa54c311.exe

  • Size

    89KB

  • Sample

    250124-a7zlfa1pcw

  • MD5

    1d95a0629c73e5c1f62e57842220a52b

  • SHA1

    fb36e2f3608b053c4bcf2637a86e41f616c111c1

  • SHA256

    7181d8c6e8f9b2fdafd5017407bba96ca87ef031f423880e3c513a96aa54c311

  • SHA512

    4e773fa8485926daa1743b8f6a551fbb1c01c74c31e8f372285d80ef7a2b266187d8120915542d653269abaee0818a471c4bc13bf3322a50f342bc9ab20ba931

  • SSDEEP

    1536:I1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7q:c+4MJIkLZJNAQ9Jo9q

Malware Config

Targets

    • Target

      7181d8c6e8f9b2fdafd5017407bba96ca87ef031f423880e3c513a96aa54c311.exe

    • Size

      89KB

    • MD5

      1d95a0629c73e5c1f62e57842220a52b

    • SHA1

      fb36e2f3608b053c4bcf2637a86e41f616c111c1

    • SHA256

      7181d8c6e8f9b2fdafd5017407bba96ca87ef031f423880e3c513a96aa54c311

    • SHA512

      4e773fa8485926daa1743b8f6a551fbb1c01c74c31e8f372285d80ef7a2b266187d8120915542d653269abaee0818a471c4bc13bf3322a50f342bc9ab20ba931

    • SSDEEP

      1536:I1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7q:c+4MJIkLZJNAQ9Jo9q

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks