General

  • Target

    a5423d1e582c9d326ecbbd656f758a0d6278e28f5d09fe04fadfd8996ae9dc4cN.exe

  • Size

    44KB

  • Sample

    250208-g92xxazres

  • MD5

    f0831fa5ef2a1211c6e70b80660381d0

  • SHA1

    f76670698680dcdee046ddabeb8696eeffed51de

  • SHA256

    a5423d1e582c9d326ecbbd656f758a0d6278e28f5d09fe04fadfd8996ae9dc4c

  • SHA512

    566d5057ce0e2220b3f949fe5ae99e0901b5e07ed33bece8b37d683bde04c6661925c63b420a6adbb7c8cb487b1329db9597dd1a316a74d88db1c34a3cd663ec

  • SSDEEP

    768:8a+vOyMD5oQ/cXK+dbFg1TGAN2RUqZxbhxEll7j0MLlH:8a+vM4ld+TR26qZxbhO3IM

Malware Config

Targets

    • Target

      a5423d1e582c9d326ecbbd656f758a0d6278e28f5d09fe04fadfd8996ae9dc4cN.exe

    • Size

      44KB

    • MD5

      f0831fa5ef2a1211c6e70b80660381d0

    • SHA1

      f76670698680dcdee046ddabeb8696eeffed51de

    • SHA256

      a5423d1e582c9d326ecbbd656f758a0d6278e28f5d09fe04fadfd8996ae9dc4c

    • SHA512

      566d5057ce0e2220b3f949fe5ae99e0901b5e07ed33bece8b37d683bde04c6661925c63b420a6adbb7c8cb487b1329db9597dd1a316a74d88db1c34a3cd663ec

    • SSDEEP

      768:8a+vOyMD5oQ/cXK+dbFg1TGAN2RUqZxbhxEll7j0MLlH:8a+vM4ld+TR26qZxbhO3IM

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks