General

  • Target

    99bffbb6ed529c12dc661dfafff50cd38ac0464503a69d7fa1b63187c09009eeN.exe

  • Size

    110KB

  • Sample

    250208-jjp7javkdm

  • MD5

    bc73f4c7a7dd70877d37ca1b7e7c54f0

  • SHA1

    fa6d415bf0c17a3c9fc9059d949fdf7f2b384541

  • SHA256

    99bffbb6ed529c12dc661dfafff50cd38ac0464503a69d7fa1b63187c09009ee

  • SHA512

    d0e4a59bdc54677f4994226af4f28b076d5798941ffa449dcaa41e185e32d90da33b960e841a46ba917d70fc5ca2454ff225220f1ead5a589e525cb5eed4afbd

  • SSDEEP

    1536:LiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:LiyvRmDLs/ZrwWJjAqGcRJ2hQ

Malware Config

Targets

    • Target

      99bffbb6ed529c12dc661dfafff50cd38ac0464503a69d7fa1b63187c09009eeN.exe

    • Size

      110KB

    • MD5

      bc73f4c7a7dd70877d37ca1b7e7c54f0

    • SHA1

      fa6d415bf0c17a3c9fc9059d949fdf7f2b384541

    • SHA256

      99bffbb6ed529c12dc661dfafff50cd38ac0464503a69d7fa1b63187c09009ee

    • SHA512

      d0e4a59bdc54677f4994226af4f28b076d5798941ffa449dcaa41e185e32d90da33b960e841a46ba917d70fc5ca2454ff225220f1ead5a589e525cb5eed4afbd

    • SSDEEP

      1536:LiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EQ:LiyvRmDLs/ZrwWJjAqGcRJ2hQ

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks