General

  • Target

    47872a3d46cb324fdfb8439ebe7985f4f233927abe80fd414093b998c72e880c.exe

  • Size

    113KB

  • Sample

    250205-kj93dazqcr

  • MD5

    9d381a6227fac20f08af69f5f0aad0f3

  • SHA1

    daae21d7909786367ce75342f163569dca89c25d

  • SHA256

    47872a3d46cb324fdfb8439ebe7985f4f233927abe80fd414093b998c72e880c

  • SHA512

    c9910a373cf8c31a388445cc3bbd681b165fbbaac1eb850cc8c0bebae5f74593f732fd363f5389f1d2a6cee69042209b3ba77d5631add4eadac2653acaf90553

  • SSDEEP

    1536:ZiLOvRmmQegJfBbmAQ256/ZrwWhwqjhurmKFcbL86WV0Ep:ZiyvRmDLs/ZrwWjjAqGcfzWHp

Malware Config

Targets

    • Target

      47872a3d46cb324fdfb8439ebe7985f4f233927abe80fd414093b998c72e880c.exe

    • Size

      113KB

    • MD5

      9d381a6227fac20f08af69f5f0aad0f3

    • SHA1

      daae21d7909786367ce75342f163569dca89c25d

    • SHA256

      47872a3d46cb324fdfb8439ebe7985f4f233927abe80fd414093b998c72e880c

    • SHA512

      c9910a373cf8c31a388445cc3bbd681b165fbbaac1eb850cc8c0bebae5f74593f732fd363f5389f1d2a6cee69042209b3ba77d5631add4eadac2653acaf90553

    • SSDEEP

      1536:ZiLOvRmmQegJfBbmAQ256/ZrwWhwqjhurmKFcbL86WV0Ep:ZiyvRmDLs/ZrwWjjAqGcfzWHp

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks