General

  • Target

    47e90c03dd1373366a9e923f96627ebceee5c4fe221de64a6648231883e3fbe7N.exe

  • Size

    110KB

  • Sample

    250201-3tq2csxpel

  • MD5

    b5521e845fbe9601c8c10c50874c43b0

  • SHA1

    5696ef7f8392380987dec3f76e1b53efaa8927ec

  • SHA256

    47e90c03dd1373366a9e923f96627ebceee5c4fe221de64a6648231883e3fbe7

  • SHA512

    c08d1556bc8f93be938524d99c458a6cc106f7e3c5e70b74d57cbff2b807e1b3dc7c4690ef7a4c8b6a0f5797483f31cd19f292ab51308fc07aed9d02391bd115

  • SSDEEP

    1536:KiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:KiyvRmDLs/ZrwWJjAqGcRJ2hQ

Malware Config

Targets

    • Target

      47e90c03dd1373366a9e923f96627ebceee5c4fe221de64a6648231883e3fbe7N.exe

    • Size

      110KB

    • MD5

      b5521e845fbe9601c8c10c50874c43b0

    • SHA1

      5696ef7f8392380987dec3f76e1b53efaa8927ec

    • SHA256

      47e90c03dd1373366a9e923f96627ebceee5c4fe221de64a6648231883e3fbe7

    • SHA512

      c08d1556bc8f93be938524d99c458a6cc106f7e3c5e70b74d57cbff2b807e1b3dc7c4690ef7a4c8b6a0f5797483f31cd19f292ab51308fc07aed9d02391bd115

    • SSDEEP

      1536:KiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:KiyvRmDLs/ZrwWJjAqGcRJ2hQ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks