General

  • Target

    2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6

  • Size

    225KB

  • Sample

    250214-d86ypa1qdz

  • MD5

    cb4ff02eabebb0efb72861f2f6054e17

  • SHA1

    efbe406f961e2af6bff04d43b4229fd12a55076a

  • SHA256

    2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6

  • SHA512

    6472b9059f7a2217f48a7e01e635ec5a7bca6f124b9371cc92f2b83aecfa93d14a67ba74742100af357fd9649b1e83a72b369afd36dbdd48e7f7e832920082fd

  • SSDEEP

    6144:nA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:nATuTAnKGwUAW3ycQqgf

Malware Config

Targets

    • Target

      2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6

    • Size

      225KB

    • MD5

      cb4ff02eabebb0efb72861f2f6054e17

    • SHA1

      efbe406f961e2af6bff04d43b4229fd12a55076a

    • SHA256

      2d25e91e18897c9d8f146aa6036228a4e4b25f02fdc89017bed5d8d9852693f6

    • SHA512

      6472b9059f7a2217f48a7e01e635ec5a7bca6f124b9371cc92f2b83aecfa93d14a67ba74742100af357fd9649b1e83a72b369afd36dbdd48e7f7e832920082fd

    • SSDEEP

      6144:nA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:nATuTAnKGwUAW3ycQqgf

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks