General

  • Target

    37381d493151feff2f37a508a1d71c70cebfe7438be105e5c40c906dc60ad75eN.exe

  • Size

    110KB

  • Sample

    250127-k27d7s1lht

  • MD5

    726cc120235ef300fc63ce8273321000

  • SHA1

    307bf6941a35cfe4d3191f59a9c99dc40630efee

  • SHA256

    37381d493151feff2f37a508a1d71c70cebfe7438be105e5c40c906dc60ad75e

  • SHA512

    9a9e92fb9d522b0df145661c50c85584a620136eb208076ed5d1525adebc5b92f47e4a14df9a3e532fd110e03bd472ea92e535b6f8528e9a604bee6c847298b1

  • SSDEEP

    1536:diLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:diyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      37381d493151feff2f37a508a1d71c70cebfe7438be105e5c40c906dc60ad75eN.exe

    • Size

      110KB

    • MD5

      726cc120235ef300fc63ce8273321000

    • SHA1

      307bf6941a35cfe4d3191f59a9c99dc40630efee

    • SHA256

      37381d493151feff2f37a508a1d71c70cebfe7438be105e5c40c906dc60ad75e

    • SHA512

      9a9e92fb9d522b0df145661c50c85584a620136eb208076ed5d1525adebc5b92f47e4a14df9a3e532fd110e03bd472ea92e535b6f8528e9a604bee6c847298b1

    • SSDEEP

      1536:diLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:diyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks