General

  • Target

    50e333383be25a41ad81e34fb12daff71b5c3f9bbb5481715877b4981d59ae51N.exe

  • Size

    52KB

  • Sample

    250208-mbgf7synhz

  • MD5

    1ba9fb1ed9b48205d3387917ded79b40

  • SHA1

    5cfd3f047ab06ab5faf84423f1c7510c2817c7e6

  • SHA256

    50e333383be25a41ad81e34fb12daff71b5c3f9bbb5481715877b4981d59ae51

  • SHA512

    ad38241d9d675335416faca85ed2ee932e07cef39dc41e993bffccc746db2acb18a31faea33971aa3fa1f153038bce7196336d9f7fa399e38d447b696b930848

  • SSDEEP

    768:JvC6RMtZNZUXeb4fXDR2JVDDISp8m7DM3pIg4LqTTUUnGg7O1/l9Jqn:lmZNZUXeQXFhS6sM3prUSGg7O1d9Jq

Malware Config

Targets

    • Target

      50e333383be25a41ad81e34fb12daff71b5c3f9bbb5481715877b4981d59ae51N.exe

    • Size

      52KB

    • MD5

      1ba9fb1ed9b48205d3387917ded79b40

    • SHA1

      5cfd3f047ab06ab5faf84423f1c7510c2817c7e6

    • SHA256

      50e333383be25a41ad81e34fb12daff71b5c3f9bbb5481715877b4981d59ae51

    • SHA512

      ad38241d9d675335416faca85ed2ee932e07cef39dc41e993bffccc746db2acb18a31faea33971aa3fa1f153038bce7196336d9f7fa399e38d447b696b930848

    • SSDEEP

      768:JvC6RMtZNZUXeb4fXDR2JVDDISp8m7DM3pIg4LqTTUUnGg7O1/l9Jqn:lmZNZUXeQXFhS6sM3prUSGg7O1d9Jq

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks