General

  • Target

    ccb37dadcd3fce7a0157e26043deb81d20f2ac55cf3910dd0a6aa71153751a9d.exe

  • Size

    225KB

  • Sample

    250211-mb8kpatpc1

  • MD5

    c1cab8f76e3e865e287dd4229bbbaa89

  • SHA1

    5d4ce1aff77bf2252d8afa338edbe10d6a49b02b

  • SHA256

    ccb37dadcd3fce7a0157e26043deb81d20f2ac55cf3910dd0a6aa71153751a9d

  • SHA512

    131d06a49f1caff00766182f20fabde9644b034eb4ba47c7722b0b82b18837c494da4165e0ee45d13ed4046718b095fd27847cbb699bd9dea69a408df0f27912

  • SSDEEP

    6144:JA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:JATuTAnKGwUAW3ycQqgP

Malware Config

Targets

    • Target

      ccb37dadcd3fce7a0157e26043deb81d20f2ac55cf3910dd0a6aa71153751a9d.exe

    • Size

      225KB

    • MD5

      c1cab8f76e3e865e287dd4229bbbaa89

    • SHA1

      5d4ce1aff77bf2252d8afa338edbe10d6a49b02b

    • SHA256

      ccb37dadcd3fce7a0157e26043deb81d20f2ac55cf3910dd0a6aa71153751a9d

    • SHA512

      131d06a49f1caff00766182f20fabde9644b034eb4ba47c7722b0b82b18837c494da4165e0ee45d13ed4046718b095fd27847cbb699bd9dea69a408df0f27912

    • SSDEEP

      6144:JA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:JATuTAnKGwUAW3ycQqgP

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks