General

  • Target

    744e8aa80821ff46a59bb2c3f11467052739ed9aa97ecaab38867b46d9472f27.exe

  • Size

    110KB

  • Sample

    250205-qpkmkazlcr

  • MD5

    4842a2aadfae8ca21c5925adf1840845

  • SHA1

    3734af895d63e0c464846c4a8b12dfa376b303fd

  • SHA256

    744e8aa80821ff46a59bb2c3f11467052739ed9aa97ecaab38867b46d9472f27

  • SHA512

    b3326bb68ab93fdddf0e421295cd2572a146c7d1b44710049e28084000a13b484de8b8b6c0669ea9c99639258fd9bee3014832d44325d861d2d72826253a6cbe

  • SSDEEP

    1536:UiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:UiyvRmDLs/ZrwWJjAqGcRJ2hQ

Malware Config

Targets

    • Target

      744e8aa80821ff46a59bb2c3f11467052739ed9aa97ecaab38867b46d9472f27.exe

    • Size

      110KB

    • MD5

      4842a2aadfae8ca21c5925adf1840845

    • SHA1

      3734af895d63e0c464846c4a8b12dfa376b303fd

    • SHA256

      744e8aa80821ff46a59bb2c3f11467052739ed9aa97ecaab38867b46d9472f27

    • SHA512

      b3326bb68ab93fdddf0e421295cd2572a146c7d1b44710049e28084000a13b484de8b8b6c0669ea9c99639258fd9bee3014832d44325d861d2d72826253a6cbe

    • SSDEEP

      1536:UiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:UiyvRmDLs/ZrwWJjAqGcRJ2hQ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks