General

  • Target

    81435690d97be25c7e55da610c6dfa2f5aa08d274dd16014865efe16ad78b11fN.exe

  • Size

    110KB

  • Sample

    250204-v5jseswldp

  • MD5

    e9c8014a032b75fe22c32905bec32b20

  • SHA1

    56da61c9fa10d2503938fdd279957148ac45fac3

  • SHA256

    81435690d97be25c7e55da610c6dfa2f5aa08d274dd16014865efe16ad78b11f

  • SHA512

    5a4f5bafbe18e89b2a040445daf99514ea2abe728b4aba6cc2dabb6c76e6bc5250de93c1c72f187d72d4516123f72dceab47eb6340def6ecda2a65a46ea123e5

  • SSDEEP

    1536:7iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:7iyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      81435690d97be25c7e55da610c6dfa2f5aa08d274dd16014865efe16ad78b11fN.exe

    • Size

      110KB

    • MD5

      e9c8014a032b75fe22c32905bec32b20

    • SHA1

      56da61c9fa10d2503938fdd279957148ac45fac3

    • SHA256

      81435690d97be25c7e55da610c6dfa2f5aa08d274dd16014865efe16ad78b11f

    • SHA512

      5a4f5bafbe18e89b2a040445daf99514ea2abe728b4aba6cc2dabb6c76e6bc5250de93c1c72f187d72d4516123f72dceab47eb6340def6ecda2a65a46ea123e5

    • SSDEEP

      1536:7iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:7iyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks