General

  • Target

    127268547e73bc03a4867a56c4afd5b98949be9ba6223caea1cd28cb91363e31.exe

  • Size

    225KB

  • Sample

    250216-p53bwaxrhl

  • MD5

    a9f587663c2206506f1924faf1d460b1

  • SHA1

    3ae5add94e53fa69234090caf4534bf274073b7a

  • SHA256

    127268547e73bc03a4867a56c4afd5b98949be9ba6223caea1cd28cb91363e31

  • SHA512

    79b729ddda3905ba541bbcd5f5090f9d65db36e4a1a76203cd123b6386874f984bb265737b13c3e111b4d6cdef241eadb17579e95b0a68c9a576ee62437dd81a

  • SSDEEP

    6144:zA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpY0:zATuTAnKGwUAW3ycQqg1

Malware Config

Targets

    • Target

      127268547e73bc03a4867a56c4afd5b98949be9ba6223caea1cd28cb91363e31.exe

    • Size

      225KB

    • MD5

      a9f587663c2206506f1924faf1d460b1

    • SHA1

      3ae5add94e53fa69234090caf4534bf274073b7a

    • SHA256

      127268547e73bc03a4867a56c4afd5b98949be9ba6223caea1cd28cb91363e31

    • SHA512

      79b729ddda3905ba541bbcd5f5090f9d65db36e4a1a76203cd123b6386874f984bb265737b13c3e111b4d6cdef241eadb17579e95b0a68c9a576ee62437dd81a

    • SSDEEP

      6144:zA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpY0:zATuTAnKGwUAW3ycQqg1

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks