General

  • Target

    e0673ba5efd64713ef36423d9ddd945e5317f08c427db86b7335647e2e39feedN.exe

  • Size

    110KB

  • Sample

    250204-2ghc1swjet

  • MD5

    5d206ca752a034436cf7f40bd7f54ad0

  • SHA1

    d3adeacb5c997b59e1c28abd14c7d0f35e94d5c3

  • SHA256

    e0673ba5efd64713ef36423d9ddd945e5317f08c427db86b7335647e2e39feed

  • SHA512

    e171f27c3283e2d572bbbcac3ca4d975fde8a89719de451ce591f14cf86e63865d7898cdc70d02be4e482b0124379095667a3ad1859255ba62ee0826f176b0c5

  • SSDEEP

    1536:oiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:oiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      e0673ba5efd64713ef36423d9ddd945e5317f08c427db86b7335647e2e39feedN.exe

    • Size

      110KB

    • MD5

      5d206ca752a034436cf7f40bd7f54ad0

    • SHA1

      d3adeacb5c997b59e1c28abd14c7d0f35e94d5c3

    • SHA256

      e0673ba5efd64713ef36423d9ddd945e5317f08c427db86b7335647e2e39feed

    • SHA512

      e171f27c3283e2d572bbbcac3ca4d975fde8a89719de451ce591f14cf86e63865d7898cdc70d02be4e482b0124379095667a3ad1859255ba62ee0826f176b0c5

    • SSDEEP

      1536:oiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:oiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks