General

  • Target

    2789ca66645774c0f84e86ff95c7944a8a4fa9b8bb4874d3fb9cac1f2335e3c7

  • Size

    140KB

  • Sample

    250214-dxh3gszqck

  • MD5

    d0fd16615cddc8fb8c3db6aef3f908f5

  • SHA1

    d1d3463d544a5e4d64f6392bdd48c223b454da43

  • SHA256

    2789ca66645774c0f84e86ff95c7944a8a4fa9b8bb4874d3fb9cac1f2335e3c7

  • SHA512

    36fb81f78b13c6e5e9891c9a81025328acf2213a5a6993bc8f95482719892690259d5115bc181d04c9ace15f1eeb860f74c784e7c60b0834171f74086edabf6f

  • SSDEEP

    1536:UFs7HiNtZvXRPM/LfT4B4831plxM+1nR4DnrToGXRVWBriXLuh2wb/8aHHqz8fgj:UWm5KFW4UriXO2wb/Rqz8fgmm

Malware Config

Targets

    • Target

      2789ca66645774c0f84e86ff95c7944a8a4fa9b8bb4874d3fb9cac1f2335e3c7

    • Size

      140KB

    • MD5

      d0fd16615cddc8fb8c3db6aef3f908f5

    • SHA1

      d1d3463d544a5e4d64f6392bdd48c223b454da43

    • SHA256

      2789ca66645774c0f84e86ff95c7944a8a4fa9b8bb4874d3fb9cac1f2335e3c7

    • SHA512

      36fb81f78b13c6e5e9891c9a81025328acf2213a5a6993bc8f95482719892690259d5115bc181d04c9ace15f1eeb860f74c784e7c60b0834171f74086edabf6f

    • SSDEEP

      1536:UFs7HiNtZvXRPM/LfT4B4831plxM+1nR4DnrToGXRVWBriXLuh2wb/8aHHqz8fgj:UWm5KFW4UriXO2wb/Rqz8fgmm

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks