General

  • Target

    694decb30226b8e3da044ce0ad963bbeff1af9af4a94c0527a954de6cbd08da6.exe

  • Size

    44KB

  • Sample

    250125-1l2rsa1mcv

  • MD5

    0542abbf4c34bbff628ba9d0c3739405

  • SHA1

    01561008ac53c3ce129ea913f8709eb95477acb7

  • SHA256

    694decb30226b8e3da044ce0ad963bbeff1af9af4a94c0527a954de6cbd08da6

  • SHA512

    0f26da01613ab47352bca5db03c12432287295d15fe170c4a9c7887b2f1dbb436d543392c4b5ed23a2881307bd1122c9b8c41982ac92b4f192542634475140e9

  • SSDEEP

    768:Ra+vOyMD5oQ/cXK+dbFg1TGAN2RUqZxbhxEll7j0MLlH:Ra+vM4ld+TR26qZxbhO3IM

Malware Config

Targets

    • Target

      694decb30226b8e3da044ce0ad963bbeff1af9af4a94c0527a954de6cbd08da6.exe

    • Size

      44KB

    • MD5

      0542abbf4c34bbff628ba9d0c3739405

    • SHA1

      01561008ac53c3ce129ea913f8709eb95477acb7

    • SHA256

      694decb30226b8e3da044ce0ad963bbeff1af9af4a94c0527a954de6cbd08da6

    • SHA512

      0f26da01613ab47352bca5db03c12432287295d15fe170c4a9c7887b2f1dbb436d543392c4b5ed23a2881307bd1122c9b8c41982ac92b4f192542634475140e9

    • SSDEEP

      768:Ra+vOyMD5oQ/cXK+dbFg1TGAN2RUqZxbhxEll7j0MLlH:Ra+vM4ld+TR26qZxbhO3IM

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks