General

  • Target

    139260cd786f3d6731abbfda2184ec893adb5b8eaa04dbc45e711df24b9cc996.exe

  • Size

    52KB

  • Sample

    250212-rdrgeavkaq

  • MD5

    1771af709376d7aa5bb37b8803f175f9

  • SHA1

    4e0954080b36818b2ed612022e7795ff159b20f7

  • SHA256

    139260cd786f3d6731abbfda2184ec893adb5b8eaa04dbc45e711df24b9cc996

  • SHA512

    0cc4f82629e41d06f651d0caf06d0238dfe3ae6dff821f583a8f0681750c396d091ebdfdfd95887469bb5638a01810ede2afd01208cb55b0158af73420806e01

  • SSDEEP

    768:JvC6RMtZNZUXeb4fXDR2JVDDISp8m7DM3pIg4LqTTUUnGg7O1/l9Jq/:lmZNZUXeQXFhS6sM3prUSGg7O1d9Ja

Malware Config

Targets

    • Target

      139260cd786f3d6731abbfda2184ec893adb5b8eaa04dbc45e711df24b9cc996.exe

    • Size

      52KB

    • MD5

      1771af709376d7aa5bb37b8803f175f9

    • SHA1

      4e0954080b36818b2ed612022e7795ff159b20f7

    • SHA256

      139260cd786f3d6731abbfda2184ec893adb5b8eaa04dbc45e711df24b9cc996

    • SHA512

      0cc4f82629e41d06f651d0caf06d0238dfe3ae6dff821f583a8f0681750c396d091ebdfdfd95887469bb5638a01810ede2afd01208cb55b0158af73420806e01

    • SSDEEP

      768:JvC6RMtZNZUXeb4fXDR2JVDDISp8m7DM3pIg4LqTTUUnGg7O1/l9Jq/:lmZNZUXeQXFhS6sM3prUSGg7O1d9Ja

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks