General

  • Target

    38a2f2d0fbb26e1f2ab109d4779cd31e79244298a6ceb83bf483a0268dc8e355.zip

  • Size

    45KB

  • Sample

    250128-q986natmem

  • MD5

    e18e97f1b62f5bcf463778e15ed535cf

  • SHA1

    7e6650f0285abcaef9e483d31068050dec72c1a1

  • SHA256

    40a4664124814e2481b1c0c971ece9a1ef3483d74a390c6869e1fa635b63a32d

  • SHA512

    83d42734177230798fb1ec892703d6066a00da7c75cb39558c282112bffd38e928c9784281c98c11b6711c031e85dbb051b0f08ad0b13b09e46fd880e3d055d0

  • SSDEEP

    768:ryIh6crrxPcKTjlIUllHA0fwq3RnSiBBajGGsCrwo9QdIKv2y6S:+IhlqKTjaUllHX3Rn1gXXwo9JKuyD

Malware Config

Targets

    • Target

      38a2f2d0fbb26e1f2ab109d4779cd31e79244298a6ceb83bf483a0268dc8e355.exe

    • Size

      110KB

    • MD5

      fe52f2d0bde65b46f3690d58dbf708c0

    • SHA1

      f613b369fdd56bf29908f6a9f854a201adf9309a

    • SHA256

      38a2f2d0fbb26e1f2ab109d4779cd31e79244298a6ceb83bf483a0268dc8e355

    • SHA512

      02545224f492bd2169dd91dd0d79a6460d5d62279f0b839fc85eb283df1e286d8284ea522ac604280d3eb7499390c6cd5a4418ef0f6ec6017e4b71c9ac149ed6

    • SSDEEP

      1536:2iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:2iyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks