General

  • Target

    5f01fc454aec717be6a73104d52a2a67c4a8083055e1b52b3e91238e2392c6d5

  • Size

    90KB

  • Sample

    250208-ajzarswmdn

  • MD5

    e37319a6f77e4099e565da68ea83beb7

  • SHA1

    922ba0b47735e333c9342bef7de17e7c7c0c3768

  • SHA256

    5f01fc454aec717be6a73104d52a2a67c4a8083055e1b52b3e91238e2392c6d5

  • SHA512

    30b5eaab84f0bf007f45efd552d6ea99039ae98ffb2f29e0bb308482b619f90c88829ba5cce17d46f81c8af9e98104e4a322360b1a78f72d4158ef0c89ed9bd7

  • SSDEEP

    1536:xAz44CpRkr9DXhHf3aOd/56RrZ7qjh3rmKPNY+o2:xAzvokZR/KM/y8jZqMNY/2

Malware Config

Targets

    • Target

      5f01fc454aec717be6a73104d52a2a67c4a8083055e1b52b3e91238e2392c6d5

    • Size

      90KB

    • MD5

      e37319a6f77e4099e565da68ea83beb7

    • SHA1

      922ba0b47735e333c9342bef7de17e7c7c0c3768

    • SHA256

      5f01fc454aec717be6a73104d52a2a67c4a8083055e1b52b3e91238e2392c6d5

    • SHA512

      30b5eaab84f0bf007f45efd552d6ea99039ae98ffb2f29e0bb308482b619f90c88829ba5cce17d46f81c8af9e98104e4a322360b1a78f72d4158ef0c89ed9bd7

    • SSDEEP

      1536:xAz44CpRkr9DXhHf3aOd/56RrZ7qjh3rmKPNY+o2:xAzvokZR/KM/y8jZqMNY/2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks