General

  • Target

    1720c15a576fa6ded968fb798c12cfc9d1c93a0d723bbf420ee89f38f5577430.exe

  • Size

    45KB

  • Sample

    250201-mmgaksyjfv

  • MD5

    84679050cb202d120a4abbeec6af4f2d

  • SHA1

    a47196b5fe6af8fc12694f413a298386c42ce1fe

  • SHA256

    1720c15a576fa6ded968fb798c12cfc9d1c93a0d723bbf420ee89f38f5577430

  • SHA512

    d89c18197a6c50f98bfa76628b3644657c5c70e2986c05b3b7391e34815793a47ded5f104f216a0ff0909d4028fdd684281ed1242274429ac5d9b9e1ff29f15d

  • SSDEEP

    768:phP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2V:zsWE9N5dFu53dsniQaB/xZ14n7zIF+q5

Malware Config

Targets

    • Target

      1720c15a576fa6ded968fb798c12cfc9d1c93a0d723bbf420ee89f38f5577430.exe

    • Size

      45KB

    • MD5

      84679050cb202d120a4abbeec6af4f2d

    • SHA1

      a47196b5fe6af8fc12694f413a298386c42ce1fe

    • SHA256

      1720c15a576fa6ded968fb798c12cfc9d1c93a0d723bbf420ee89f38f5577430

    • SHA512

      d89c18197a6c50f98bfa76628b3644657c5c70e2986c05b3b7391e34815793a47ded5f104f216a0ff0909d4028fdd684281ed1242274429ac5d9b9e1ff29f15d

    • SSDEEP

      768:phP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2V:zsWE9N5dFu53dsniQaB/xZ14n7zIF+q5

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks