General

  • Target

    f15b3543311c39a8949a9af35ecb6a82f469d099b906d5ea60343d7f9b54ed86N.exe

  • Size

    110KB

  • Sample

    250204-xxn4aaxqbw

  • MD5

    712f2402f4383d3c15f64728ea410c30

  • SHA1

    42a46d9407c94ebc2037469d9b7bae39f163c3be

  • SHA256

    f15b3543311c39a8949a9af35ecb6a82f469d099b906d5ea60343d7f9b54ed86

  • SHA512

    0f280c4a944d330d7f86a0861b476e02ab789cb3e662e2169aa4d6f7a1883b4fcca96a92e6681ce9ad1b0f263deb64ae64f026442ff5640c87723b1c1e76efc6

  • SSDEEP

    1536:UiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:UiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      f15b3543311c39a8949a9af35ecb6a82f469d099b906d5ea60343d7f9b54ed86N.exe

    • Size

      110KB

    • MD5

      712f2402f4383d3c15f64728ea410c30

    • SHA1

      42a46d9407c94ebc2037469d9b7bae39f163c3be

    • SHA256

      f15b3543311c39a8949a9af35ecb6a82f469d099b906d5ea60343d7f9b54ed86

    • SHA512

      0f280c4a944d330d7f86a0861b476e02ab789cb3e662e2169aa4d6f7a1883b4fcca96a92e6681ce9ad1b0f263deb64ae64f026442ff5640c87723b1c1e76efc6

    • SSDEEP

      1536:UiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:UiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks