General

  • Target

    13c56dbd6fc67255336e251cfa23944f5cbb31fb35d91ab470e69ec3b1e0128bN.exe

  • Size

    89KB

  • Sample

    250124-w3nh9ssrfn

  • MD5

    885c1fb132c891559083cd0a8a60af10

  • SHA1

    1f4ad1865870427eeebb1aec80ebdf4a4ee8202f

  • SHA256

    13c56dbd6fc67255336e251cfa23944f5cbb31fb35d91ab470e69ec3b1e0128b

  • SHA512

    4f4508609ccb041d7bd69ce88a89492223277ab58fb203767eab4c84460e2883e1468f9555bdcd394f696993aab9b07be0c9735f571c48f44809d7fd9a8c7e29

  • SSDEEP

    1536:91+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7a:f+4MJIkLZJNAQ9Jo9a

Malware Config

Targets

    • Target

      13c56dbd6fc67255336e251cfa23944f5cbb31fb35d91ab470e69ec3b1e0128bN.exe

    • Size

      89KB

    • MD5

      885c1fb132c891559083cd0a8a60af10

    • SHA1

      1f4ad1865870427eeebb1aec80ebdf4a4ee8202f

    • SHA256

      13c56dbd6fc67255336e251cfa23944f5cbb31fb35d91ab470e69ec3b1e0128b

    • SHA512

      4f4508609ccb041d7bd69ce88a89492223277ab58fb203767eab4c84460e2883e1468f9555bdcd394f696993aab9b07be0c9735f571c48f44809d7fd9a8c7e29

    • SSDEEP

      1536:91+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7a:f+4MJIkLZJNAQ9Jo9a

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks