General

  • Target

    7087bf238addbd8ada881d9014fa1313e3286c3f24080400ad1560b4fbef52e1.exe

  • Size

    110KB

  • Sample

    250125-c8gs5asrfn

  • MD5

    9042a9ccf2ca4a7d13039b8ffe3ada00

  • SHA1

    3ba4fa515182cca7bcfd0fc0fda867b9f5c1a3fa

  • SHA256

    7087bf238addbd8ada881d9014fa1313e3286c3f24080400ad1560b4fbef52e1

  • SHA512

    db0b5db6e1d513a88c7ce63a2d6b712e6e48486b1dfbd814e75b3b208ba8a3ddbbd895df2225409dd1569e8cc0cb1000a101f8dfcacba153b8ca633b8b442dc4

  • SSDEEP

    1536:miLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:miyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      7087bf238addbd8ada881d9014fa1313e3286c3f24080400ad1560b4fbef52e1.exe

    • Size

      110KB

    • MD5

      9042a9ccf2ca4a7d13039b8ffe3ada00

    • SHA1

      3ba4fa515182cca7bcfd0fc0fda867b9f5c1a3fa

    • SHA256

      7087bf238addbd8ada881d9014fa1313e3286c3f24080400ad1560b4fbef52e1

    • SHA512

      db0b5db6e1d513a88c7ce63a2d6b712e6e48486b1dfbd814e75b3b208ba8a3ddbbd895df2225409dd1569e8cc0cb1000a101f8dfcacba153b8ca633b8b442dc4

    • SSDEEP

      1536:miLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:miyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks