General

  • Target

    33c3d0c4847980dc79536ef491e596c6365d75d736bf8aabb814f995f6deb6f8.exe

  • Size

    89KB

  • Sample

    250125-j4rwvstpf1

  • MD5

    9a2453d636b02c5d149ab3104904b0c7

  • SHA1

    ddf9d6d873bdcc94b0923b2f04aa228b67206d6b

  • SHA256

    33c3d0c4847980dc79536ef491e596c6365d75d736bf8aabb814f995f6deb6f8

  • SHA512

    c07ea5183ad6aa14365d824e42b4b4338796272d0830a8c7c535cdd7afc20cbab94d54d6e269bbc607fc83631c4d624a9212098b223f505da8f0e424af33b264

  • SSDEEP

    1536:f1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7u:d+4MJIkLZJNAQ9Jo9u

Malware Config

Targets

    • Target

      33c3d0c4847980dc79536ef491e596c6365d75d736bf8aabb814f995f6deb6f8.exe

    • Size

      89KB

    • MD5

      9a2453d636b02c5d149ab3104904b0c7

    • SHA1

      ddf9d6d873bdcc94b0923b2f04aa228b67206d6b

    • SHA256

      33c3d0c4847980dc79536ef491e596c6365d75d736bf8aabb814f995f6deb6f8

    • SHA512

      c07ea5183ad6aa14365d824e42b4b4338796272d0830a8c7c535cdd7afc20cbab94d54d6e269bbc607fc83631c4d624a9212098b223f505da8f0e424af33b264

    • SSDEEP

      1536:f1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7u:d+4MJIkLZJNAQ9Jo9u

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks