General

  • Target

    a26c674de61dec925067e3c66adeee37ab0c13cb59d9e22556194b91ffaab5e4.exe

  • Size

    110KB

  • Sample

    250204-zc8y3asqan

  • MD5

    f2aa6c20af9947d2d897b25c54554d1d

  • SHA1

    e9135f5dae8d3c6b836946b972b7957c98745f4b

  • SHA256

    a26c674de61dec925067e3c66adeee37ab0c13cb59d9e22556194b91ffaab5e4

  • SHA512

    f4f001e37b97548ec5a5857af0a78494c18cc967d485062f3cc7f674278bdc0ba47635e7152d8617bb6973d4e9594ae8fda6de1e0c9326ba28897ed608225bbf

  • SSDEEP

    1536:KiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:KiyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      a26c674de61dec925067e3c66adeee37ab0c13cb59d9e22556194b91ffaab5e4.exe

    • Size

      110KB

    • MD5

      f2aa6c20af9947d2d897b25c54554d1d

    • SHA1

      e9135f5dae8d3c6b836946b972b7957c98745f4b

    • SHA256

      a26c674de61dec925067e3c66adeee37ab0c13cb59d9e22556194b91ffaab5e4

    • SHA512

      f4f001e37b97548ec5a5857af0a78494c18cc967d485062f3cc7f674278bdc0ba47635e7152d8617bb6973d4e9594ae8fda6de1e0c9326ba28897ed608225bbf

    • SSDEEP

      1536:KiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:KiyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks