General

  • Target

    f9012c6428899b5f4030fcfcae4dbae78384ed2b418ccdaad3af3667ca05755cN.exe

  • Size

    49KB

  • Sample

    250205-hm885swqap

  • MD5

    b89a770e34c4f7264bd0678cb619c580

  • SHA1

    8319fbd826afc1e87dbdd3dcc45adfb98aaddedf

  • SHA256

    f9012c6428899b5f4030fcfcae4dbae78384ed2b418ccdaad3af3667ca05755c

  • SHA512

    446a51d55a5835201fac5451fb1a5c5fd63e89860e2255a16ce264a0fde5e28bf135ca98e3d4b22f62cdfca75428fe64804b2bd594df35071995103793b6ad04

  • SSDEEP

    1536:OOBLXNqgzf2v6b6NkXklZlogHGe9eBXW:OYLduv6OqXIlogmjW

Malware Config

Targets

    • Target

      f9012c6428899b5f4030fcfcae4dbae78384ed2b418ccdaad3af3667ca05755cN.exe

    • Size

      49KB

    • MD5

      b89a770e34c4f7264bd0678cb619c580

    • SHA1

      8319fbd826afc1e87dbdd3dcc45adfb98aaddedf

    • SHA256

      f9012c6428899b5f4030fcfcae4dbae78384ed2b418ccdaad3af3667ca05755c

    • SHA512

      446a51d55a5835201fac5451fb1a5c5fd63e89860e2255a16ce264a0fde5e28bf135ca98e3d4b22f62cdfca75428fe64804b2bd594df35071995103793b6ad04

    • SSDEEP

      1536:OOBLXNqgzf2v6b6NkXklZlogHGe9eBXW:OYLduv6OqXIlogmjW

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks