General

  • Target

    ee319f019d9dce1ee396ac9ae25346d0c0bcd311711338076e3187f33d069d85

  • Size

    49KB

  • Sample

    250207-hmc6pstrcp

  • MD5

    3530842ad0cb52b38396b9f4f1f52b2a

  • SHA1

    a8f3dcbc0c90908de52493c485c97f405a88a5cc

  • SHA256

    ee319f019d9dce1ee396ac9ae25346d0c0bcd311711338076e3187f33d069d85

  • SHA512

    5459eb17e7d36d73dd3022f5706605a167e0e41e01f38fbb9433445ac94900bab70d9a7645bbf2b653f1dc0d8cf31b85399bd22ed6c9dc110b4554c633fa8700

  • SSDEEP

    1536:8OBLXNqgzf2v6b6NkXklZlogHGe9eBXW:8YLduv6OqXIlogmjW

Malware Config

Targets

    • Target

      ee319f019d9dce1ee396ac9ae25346d0c0bcd311711338076e3187f33d069d85

    • Size

      49KB

    • MD5

      3530842ad0cb52b38396b9f4f1f52b2a

    • SHA1

      a8f3dcbc0c90908de52493c485c97f405a88a5cc

    • SHA256

      ee319f019d9dce1ee396ac9ae25346d0c0bcd311711338076e3187f33d069d85

    • SHA512

      5459eb17e7d36d73dd3022f5706605a167e0e41e01f38fbb9433445ac94900bab70d9a7645bbf2b653f1dc0d8cf31b85399bd22ed6c9dc110b4554c633fa8700

    • SSDEEP

      1536:8OBLXNqgzf2v6b6NkXklZlogHGe9eBXW:8YLduv6OqXIlogmjW

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks