General

  • Target

    55b816474c00281834ee0cfe085dc52d5397218aabd5ee680589e3f2c18879e2N.exe

  • Size

    225KB

  • Sample

    250212-p1l44asjbv

  • MD5

    cf0438c4355f001e50d0aed68fd21920

  • SHA1

    a6b399850b0aa6fb9a034d14199c10f089771994

  • SHA256

    55b816474c00281834ee0cfe085dc52d5397218aabd5ee680589e3f2c18879e2

  • SHA512

    da3a635069e29d03413ee64b3e808baa4dd4d1d98440a001b0102df4673bef470d955f057477bb031580911c465adda5bbec544e6babc050f61a5cbdc4b3d888

  • SSDEEP

    6144:JA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:JATuTAnKGwUAW3ycQqgf

Malware Config

Targets

    • Target

      55b816474c00281834ee0cfe085dc52d5397218aabd5ee680589e3f2c18879e2N.exe

    • Size

      225KB

    • MD5

      cf0438c4355f001e50d0aed68fd21920

    • SHA1

      a6b399850b0aa6fb9a034d14199c10f089771994

    • SHA256

      55b816474c00281834ee0cfe085dc52d5397218aabd5ee680589e3f2c18879e2

    • SHA512

      da3a635069e29d03413ee64b3e808baa4dd4d1d98440a001b0102df4673bef470d955f057477bb031580911c465adda5bbec544e6babc050f61a5cbdc4b3d888

    • SSDEEP

      6144:JA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:JATuTAnKGwUAW3ycQqgf

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks