General

  • Target

    1870d793b243ac984d21406a75ab02bb253a727a23ebda8900acdc8a2439fd78.exe

  • Size

    110KB

  • Sample

    250126-z9gk3strf1

  • MD5

    ca1ad4921c36244782141aba4e5a47e0

  • SHA1

    23c49c58ae4c0e5fd38e84d15ce7655ca8bfe352

  • SHA256

    1870d793b243ac984d21406a75ab02bb253a727a23ebda8900acdc8a2439fd78

  • SHA512

    d4fa16013ac9972a652c9f1e856cdc6df645f0d20dc7b9386cb2794c18e028d715ddc612cf29b749257aa2fff2201480ffa85a0a88f6b162da025dc9dd4fcaf5

  • SSDEEP

    1536:FiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:FiyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      1870d793b243ac984d21406a75ab02bb253a727a23ebda8900acdc8a2439fd78.exe

    • Size

      110KB

    • MD5

      ca1ad4921c36244782141aba4e5a47e0

    • SHA1

      23c49c58ae4c0e5fd38e84d15ce7655ca8bfe352

    • SHA256

      1870d793b243ac984d21406a75ab02bb253a727a23ebda8900acdc8a2439fd78

    • SHA512

      d4fa16013ac9972a652c9f1e856cdc6df645f0d20dc7b9386cb2794c18e028d715ddc612cf29b749257aa2fff2201480ffa85a0a88f6b162da025dc9dd4fcaf5

    • SSDEEP

      1536:FiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:FiyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks