General

  • Target

    bd31bbccee634b9577503855e41d627a57ffa4704537362ec5c346aa69c09378.exe

  • Size

    225KB

  • Sample

    250216-nzm5bsvncx

  • MD5

    fecc017a673b056dc2e0c35a977ad3a9

  • SHA1

    798ee01cfddc79b2b71542d3f4d040b5e8acab75

  • SHA256

    bd31bbccee634b9577503855e41d627a57ffa4704537362ec5c346aa69c09378

  • SHA512

    2d742f43127b810db424a3e764f89dfd68be41ac940bed6a17c2cc180dfb9e4aa506ea00a734e3fefe89396bd807680afe74d0cc24d90ab6007955ce3da4a3e0

  • SSDEEP

    6144:OA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:OATuTAnKGwUAW3ycQqgP

Malware Config

Targets

    • Target

      bd31bbccee634b9577503855e41d627a57ffa4704537362ec5c346aa69c09378.exe

    • Size

      225KB

    • MD5

      fecc017a673b056dc2e0c35a977ad3a9

    • SHA1

      798ee01cfddc79b2b71542d3f4d040b5e8acab75

    • SHA256

      bd31bbccee634b9577503855e41d627a57ffa4704537362ec5c346aa69c09378

    • SHA512

      2d742f43127b810db424a3e764f89dfd68be41ac940bed6a17c2cc180dfb9e4aa506ea00a734e3fefe89396bd807680afe74d0cc24d90ab6007955ce3da4a3e0

    • SSDEEP

      6144:OA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:OATuTAnKGwUAW3ycQqgP

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks