General

  • Target

    eadd39a6ab343d379694146529d230e50d94a3bcb0388a7540ea230671125464N.exe

  • Size

    110KB

  • Sample

    250127-j16wlsypfx

  • MD5

    92f51ddb01fd15975ccab4406bc99740

  • SHA1

    f1ad13f6bfb0f75db6aeb7cb3187edf612ee2919

  • SHA256

    eadd39a6ab343d379694146529d230e50d94a3bcb0388a7540ea230671125464

  • SHA512

    4cd0411a0d0a43357faadf6fcb53ab8572fa47228fe523a4df137b7b369ddede843c056414089589b90c79490050fed47d33996a9ca9be1018bd356b54ec7eaf

  • SSDEEP

    1536:FiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:FiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      eadd39a6ab343d379694146529d230e50d94a3bcb0388a7540ea230671125464N.exe

    • Size

      110KB

    • MD5

      92f51ddb01fd15975ccab4406bc99740

    • SHA1

      f1ad13f6bfb0f75db6aeb7cb3187edf612ee2919

    • SHA256

      eadd39a6ab343d379694146529d230e50d94a3bcb0388a7540ea230671125464

    • SHA512

      4cd0411a0d0a43357faadf6fcb53ab8572fa47228fe523a4df137b7b369ddede843c056414089589b90c79490050fed47d33996a9ca9be1018bd356b54ec7eaf

    • SSDEEP

      1536:FiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:FiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks