General

  • Target

    57a73687e61a0cf375c7298d6a12f8db2421b7e255e317d44ca6c8842c37f35f.exe

  • Size

    44KB

  • Sample

    250208-g4jt5szpdv

  • MD5

    7ac2360c15cd718e3861d0eb549ed1b5

  • SHA1

    bbc50e84361ebf0fd769691839c109974faa2509

  • SHA256

    57a73687e61a0cf375c7298d6a12f8db2421b7e255e317d44ca6c8842c37f35f

  • SHA512

    b1d65bcd78360cf64fadd46240532744cd808cc5dfd538d4d805b74619d105cb4ad9f9dcc69170fc207b1eb0d8af24302178ec435903d6136667e7ba5888c30b

  • SSDEEP

    768:8a+vOyMD5oQ/cXK+dbFg1TGAN2RUqZxbhxEll7j0MLlHT:8a+vM4ld+TR26qZxbhO3IMz

Malware Config

Targets

    • Target

      57a73687e61a0cf375c7298d6a12f8db2421b7e255e317d44ca6c8842c37f35f.exe

    • Size

      44KB

    • MD5

      7ac2360c15cd718e3861d0eb549ed1b5

    • SHA1

      bbc50e84361ebf0fd769691839c109974faa2509

    • SHA256

      57a73687e61a0cf375c7298d6a12f8db2421b7e255e317d44ca6c8842c37f35f

    • SHA512

      b1d65bcd78360cf64fadd46240532744cd808cc5dfd538d4d805b74619d105cb4ad9f9dcc69170fc207b1eb0d8af24302178ec435903d6136667e7ba5888c30b

    • SSDEEP

      768:8a+vOyMD5oQ/cXK+dbFg1TGAN2RUqZxbhxEll7j0MLlHT:8a+vM4ld+TR26qZxbhO3IMz

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks