General

  • Target

    593c0b70db0a32fe05ef235a99fbbd4d55c3c4f3521a1ba235a91d9d75d97b19N.exe

  • Size

    49KB

  • Sample

    250205-ny2w4awqbl

  • MD5

    85b99656e973119cdd402fdec79412d0

  • SHA1

    df1b1f9ed2e8391c5f3db549e0e1954c5cc24373

  • SHA256

    593c0b70db0a32fe05ef235a99fbbd4d55c3c4f3521a1ba235a91d9d75d97b19

  • SHA512

    27260a2d961a8e89310e635cf15617d35556d4cac4657a4641cab6c7866be2df0d86600cc057068abe2487d40c835b38cdf49a29ad5f097ad6513d8e1456e2af

  • SSDEEP

    1536:DOBLXNqgzf2v6b6NkXklZlogHGe9eBXW:DYLduv6OqXIlogmjW

Malware Config

Targets

    • Target

      593c0b70db0a32fe05ef235a99fbbd4d55c3c4f3521a1ba235a91d9d75d97b19N.exe

    • Size

      49KB

    • MD5

      85b99656e973119cdd402fdec79412d0

    • SHA1

      df1b1f9ed2e8391c5f3db549e0e1954c5cc24373

    • SHA256

      593c0b70db0a32fe05ef235a99fbbd4d55c3c4f3521a1ba235a91d9d75d97b19

    • SHA512

      27260a2d961a8e89310e635cf15617d35556d4cac4657a4641cab6c7866be2df0d86600cc057068abe2487d40c835b38cdf49a29ad5f097ad6513d8e1456e2af

    • SSDEEP

      1536:DOBLXNqgzf2v6b6NkXklZlogHGe9eBXW:DYLduv6OqXIlogmjW

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks