General

  • Target

    75f7e4de6d7909c517af39ab399c201b696dabeb66e0260def000e9d583b7db1N.exe

  • Size

    88KB

  • Sample

    250208-n84tfatmf1

  • MD5

    092a03e2048c6ab40a4a42ffc4762cb0

  • SHA1

    dac7bf2b4842d16641504092d4b97d995c6c6315

  • SHA256

    75f7e4de6d7909c517af39ab399c201b696dabeb66e0260def000e9d583b7db1

  • SHA512

    f3d0e29b438e9418b6d88af297e416c3dc85b291a0864eef0f6824e9f1e8ee88c8ebbd7706fa15643b79456a4a9a70963f99c01e809673c05fe483a5093eda6c

  • SSDEEP

    1536:tPx+riFFG1g3K6KUm3wEeQqjh+rmKVsNV:TYdsFE2jwqWsNV

Malware Config

Targets

    • Target

      75f7e4de6d7909c517af39ab399c201b696dabeb66e0260def000e9d583b7db1N.exe

    • Size

      88KB

    • MD5

      092a03e2048c6ab40a4a42ffc4762cb0

    • SHA1

      dac7bf2b4842d16641504092d4b97d995c6c6315

    • SHA256

      75f7e4de6d7909c517af39ab399c201b696dabeb66e0260def000e9d583b7db1

    • SHA512

      f3d0e29b438e9418b6d88af297e416c3dc85b291a0864eef0f6824e9f1e8ee88c8ebbd7706fa15643b79456a4a9a70963f99c01e809673c05fe483a5093eda6c

    • SSDEEP

      1536:tPx+riFFG1g3K6KUm3wEeQqjh+rmKVsNV:TYdsFE2jwqWsNV

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks