General

  • Target

    3ce1940dd0ebe54ce34f014cce821e395aa2241bac0e40aa4becf81f95a1ee63N.exe

  • Size

    96KB

  • Sample

    250212-r4yneawkdp

  • MD5

    017664b2dac1bb961c3c3056d2f88c40

  • SHA1

    0fc3907dc2327747fd40934b7469ddb3b65f31c8

  • SHA256

    3ce1940dd0ebe54ce34f014cce821e395aa2241bac0e40aa4becf81f95a1ee63

  • SHA512

    8454ac69614d8a81d116019939ffa357850753ee94b740ffe3bf35e4babe4ba9cb7e390ba96b4896d624d6d9640c8924b3e68f5bf0860c92fb5185ae4cb09058

  • SSDEEP

    1536:aiLOvRmmQegJW3aOgBbmAQ256/ZrwWnwqjhurmKFct:aiyvRmQKTLs/ZrwWJjAqGct

Malware Config

Targets

    • Target

      3ce1940dd0ebe54ce34f014cce821e395aa2241bac0e40aa4becf81f95a1ee63N.exe

    • Size

      96KB

    • MD5

      017664b2dac1bb961c3c3056d2f88c40

    • SHA1

      0fc3907dc2327747fd40934b7469ddb3b65f31c8

    • SHA256

      3ce1940dd0ebe54ce34f014cce821e395aa2241bac0e40aa4becf81f95a1ee63

    • SHA512

      8454ac69614d8a81d116019939ffa357850753ee94b740ffe3bf35e4babe4ba9cb7e390ba96b4896d624d6d9640c8924b3e68f5bf0860c92fb5185ae4cb09058

    • SSDEEP

      1536:aiLOvRmmQegJW3aOgBbmAQ256/ZrwWnwqjhurmKFct:aiyvRmQKTLs/ZrwWJjAqGct

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks