General

  • Target

    12d2488c440e0b15de8d9ae9dad35917e044b9bb91ab36d29f0695de22b260bc.exe

  • Size

    89KB

  • Sample

    250212-l6331sxkcx

  • MD5

    3130d068c632441a31b2aa40bdfef81c

  • SHA1

    b8fea9ec2bb1f8c1878e26e1e1cee7c0321d9931

  • SHA256

    12d2488c440e0b15de8d9ae9dad35917e044b9bb91ab36d29f0695de22b260bc

  • SHA512

    7d6ee06fc3710d71cba297dde50a190331a3cdba3b7dcd6a8f8d3949fc4a51277daf45295ee4d4692218ee8beb7506fcd373cd80b06c8079486303e225053122

  • SSDEEP

    1536:41+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7q:s+4MJIkLZJNAQ9Jo9q

Malware Config

Targets

    • Target

      12d2488c440e0b15de8d9ae9dad35917e044b9bb91ab36d29f0695de22b260bc.exe

    • Size

      89KB

    • MD5

      3130d068c632441a31b2aa40bdfef81c

    • SHA1

      b8fea9ec2bb1f8c1878e26e1e1cee7c0321d9931

    • SHA256

      12d2488c440e0b15de8d9ae9dad35917e044b9bb91ab36d29f0695de22b260bc

    • SHA512

      7d6ee06fc3710d71cba297dde50a190331a3cdba3b7dcd6a8f8d3949fc4a51277daf45295ee4d4692218ee8beb7506fcd373cd80b06c8079486303e225053122

    • SSDEEP

      1536:41+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7q:s+4MJIkLZJNAQ9Jo9q

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks