General

  • Target

    0b729d7cd7ff39cedbefd3a947ae2056d4f99d230990d4e073daee20c77263ed.exe

  • Size

    52KB

  • Sample

    250212-kcchjatpa1

  • MD5

    1e866e95fa4b9b42ff6d06a7b956b5db

  • SHA1

    da90edc8b99810e1788c45d503cd4daac9995e00

  • SHA256

    0b729d7cd7ff39cedbefd3a947ae2056d4f99d230990d4e073daee20c77263ed

  • SHA512

    f2dac9767f7cb71d13d4b56ad82190467787b9653aff1cdbf115bb30b120ff61c4f935bc760eff911782be45ae09809d8d1e7b42f57122cd9d22b5085d006b35

  • SSDEEP

    768:NvC6RMtZNZUXeb4fXDR2JVDDISp8m7DM3pIg4LqTTUUnGg7O1/l9JqN:BmZNZUXeQXFhS6sM3prUSGg7O1d9Je

Malware Config

Targets

    • Target

      0b729d7cd7ff39cedbefd3a947ae2056d4f99d230990d4e073daee20c77263ed.exe

    • Size

      52KB

    • MD5

      1e866e95fa4b9b42ff6d06a7b956b5db

    • SHA1

      da90edc8b99810e1788c45d503cd4daac9995e00

    • SHA256

      0b729d7cd7ff39cedbefd3a947ae2056d4f99d230990d4e073daee20c77263ed

    • SHA512

      f2dac9767f7cb71d13d4b56ad82190467787b9653aff1cdbf115bb30b120ff61c4f935bc760eff911782be45ae09809d8d1e7b42f57122cd9d22b5085d006b35

    • SSDEEP

      768:NvC6RMtZNZUXeb4fXDR2JVDDISp8m7DM3pIg4LqTTUUnGg7O1/l9JqN:BmZNZUXeQXFhS6sM3prUSGg7O1d9Je

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks