General

  • Target

    c109ab2e088da970fb3765903a206e86e518db06cc545e3ced8381e784757078N.exe

  • Size

    45KB

  • Sample

    250127-azvyaasqdm

  • MD5

    eaa279d72a30f81655b9dbf0fce28310

  • SHA1

    ef9b8b5fd096ac9798451cf7ba7ceb014a2df150

  • SHA256

    c109ab2e088da970fb3765903a206e86e518db06cc545e3ced8381e784757078

  • SHA512

    4e90dcc73a06a24dfc417a758de0c25e2d3bcc07b8a0d63693a0964017b291d26d9010ff144896ee290bda10b58a729c8de7972f033c7ca1991b413387bda820

  • SSDEEP

    768:9hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2V:/sWE9N5dFu53dsniQaB/xZ14n7zIF+q5

Malware Config

Targets

    • Target

      c109ab2e088da970fb3765903a206e86e518db06cc545e3ced8381e784757078N.exe

    • Size

      45KB

    • MD5

      eaa279d72a30f81655b9dbf0fce28310

    • SHA1

      ef9b8b5fd096ac9798451cf7ba7ceb014a2df150

    • SHA256

      c109ab2e088da970fb3765903a206e86e518db06cc545e3ced8381e784757078

    • SHA512

      4e90dcc73a06a24dfc417a758de0c25e2d3bcc07b8a0d63693a0964017b291d26d9010ff144896ee290bda10b58a729c8de7972f033c7ca1991b413387bda820

    • SSDEEP

      768:9hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2V:/sWE9N5dFu53dsniQaB/xZ14n7zIF+q5

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks