General

  • Target

    7357b0fca81830b3160c9c278004b54ae7e7f9e44c4481a4d0300213278d8f35N.exe

  • Size

    110KB

  • Sample

    250124-bfkhwasjc1

  • MD5

    bf637dc1e133f068f2080e8da37053a0

  • SHA1

    3b25c227622078b5e4e0454d5e82115ddde164f3

  • SHA256

    7357b0fca81830b3160c9c278004b54ae7e7f9e44c4481a4d0300213278d8f35

  • SHA512

    aa440477e97e914993b796adc320e16fa5f14370193e7c7addf1c6f1f81249ff9d65feae2595e489557e89a708c928e0cd9d9e80343783e092bfe38abedc8b72

  • SSDEEP

    1536:YiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:YiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      7357b0fca81830b3160c9c278004b54ae7e7f9e44c4481a4d0300213278d8f35N.exe

    • Size

      110KB

    • MD5

      bf637dc1e133f068f2080e8da37053a0

    • SHA1

      3b25c227622078b5e4e0454d5e82115ddde164f3

    • SHA256

      7357b0fca81830b3160c9c278004b54ae7e7f9e44c4481a4d0300213278d8f35

    • SHA512

      aa440477e97e914993b796adc320e16fa5f14370193e7c7addf1c6f1f81249ff9d65feae2595e489557e89a708c928e0cd9d9e80343783e092bfe38abedc8b72

    • SSDEEP

      1536:YiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:YiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks