General

  • Target

    08c11394d0a62139417bd07ef7928a6547607b425c7b6cd130fabbb1358f95fc.exe

  • Size

    89KB

  • Sample

    250124-d1hwwsymbq

  • MD5

    a8f8a07c0ad15f5688976fe3a61f7b16

  • SHA1

    84e7609aedf6156614f031c87cf15da2e9de4ba8

  • SHA256

    08c11394d0a62139417bd07ef7928a6547607b425c7b6cd130fabbb1358f95fc

  • SHA512

    5b4958afd49d4783eeec88ca045b9fea9cae6f25c785c664b63b5c81d831b50dc59bf3ce7e5eb5bf16b2055e6729555c423800abb904929522ad475056057ff5

  • SSDEEP

    1536:91+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:f+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      08c11394d0a62139417bd07ef7928a6547607b425c7b6cd130fabbb1358f95fc.exe

    • Size

      89KB

    • MD5

      a8f8a07c0ad15f5688976fe3a61f7b16

    • SHA1

      84e7609aedf6156614f031c87cf15da2e9de4ba8

    • SHA256

      08c11394d0a62139417bd07ef7928a6547607b425c7b6cd130fabbb1358f95fc

    • SHA512

      5b4958afd49d4783eeec88ca045b9fea9cae6f25c785c664b63b5c81d831b50dc59bf3ce7e5eb5bf16b2055e6729555c423800abb904929522ad475056057ff5

    • SSDEEP

      1536:91+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:f+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks