General

  • Target

    607850fde67ff3b2d51021cc13c53487bd23f4b73f7e89f2dac836bbb75f7725.exe

  • Size

    110KB

  • Sample

    250204-twv9estlhp

  • MD5

    e68ab64cd4669f37134356d09729dc1d

  • SHA1

    13e317a85f3980fd50c37aa1d751c6e795ee26c9

  • SHA256

    607850fde67ff3b2d51021cc13c53487bd23f4b73f7e89f2dac836bbb75f7725

  • SHA512

    c50d4ff32b4d1890a2245459bb542dbe4960931980ca6648002c8bb7d42ae501d3f8bd81be67a42c12f3fc6384900428e114e8103cb2019bfb1bd4919ddcc1fe

  • SSDEEP

    1536:oiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:oiyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      607850fde67ff3b2d51021cc13c53487bd23f4b73f7e89f2dac836bbb75f7725.exe

    • Size

      110KB

    • MD5

      e68ab64cd4669f37134356d09729dc1d

    • SHA1

      13e317a85f3980fd50c37aa1d751c6e795ee26c9

    • SHA256

      607850fde67ff3b2d51021cc13c53487bd23f4b73f7e89f2dac836bbb75f7725

    • SHA512

      c50d4ff32b4d1890a2245459bb542dbe4960931980ca6648002c8bb7d42ae501d3f8bd81be67a42c12f3fc6384900428e114e8103cb2019bfb1bd4919ddcc1fe

    • SSDEEP

      1536:oiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:oiyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks