General

  • Target

    e598f0e4651e98e4b64dd0254f05f44958178f26e48163fc5e78fe42ab61a102N.exe

  • Size

    110KB

  • Sample

    250207-1bq8asymft

  • MD5

    16f8b4349f196406d5f402a547752ce0

  • SHA1

    58b3994ffdb56cff5f6fb135069213474140b410

  • SHA256

    e598f0e4651e98e4b64dd0254f05f44958178f26e48163fc5e78fe42ab61a102

  • SHA512

    6f1e62ae8cdd89240f19d2d922fc34d4c123ea718d9ba335078469923ce5e657fb13213ddfad471c8754f365bd094f124b19c381237532b40f885af644beab07

  • SSDEEP

    1536:LiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:LiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      e598f0e4651e98e4b64dd0254f05f44958178f26e48163fc5e78fe42ab61a102N.exe

    • Size

      110KB

    • MD5

      16f8b4349f196406d5f402a547752ce0

    • SHA1

      58b3994ffdb56cff5f6fb135069213474140b410

    • SHA256

      e598f0e4651e98e4b64dd0254f05f44958178f26e48163fc5e78fe42ab61a102

    • SHA512

      6f1e62ae8cdd89240f19d2d922fc34d4c123ea718d9ba335078469923ce5e657fb13213ddfad471c8754f365bd094f124b19c381237532b40f885af644beab07

    • SSDEEP

      1536:LiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:LiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks