General

  • Target

    ed7f6da7160f3652fcaa289cd46b42349fdb059812a43dc925e5abfe1995d7ef.exe

  • Size

    225KB

  • Sample

    250216-v2jm9atmgp

  • MD5

    1ee1370659e0e36b3aa770fc7e7d8c46

  • SHA1

    d9abeda22d30f5c740b3ca9d3485071587ecdd7c

  • SHA256

    ed7f6da7160f3652fcaa289cd46b42349fdb059812a43dc925e5abfe1995d7ef

  • SHA512

    1d46f60a6c5dcaa78ca9a7e9c50aac0dce0af876e5b7e904b3c0777f334b720162c4a04a6c3a3464509fa6e4f99f67c284642cb0e591585bc598a596a6690b88

  • SSDEEP

    6144:BA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:BATuTAnKGwUAW3ycQqgn

Malware Config

Targets

    • Target

      ed7f6da7160f3652fcaa289cd46b42349fdb059812a43dc925e5abfe1995d7ef.exe

    • Size

      225KB

    • MD5

      1ee1370659e0e36b3aa770fc7e7d8c46

    • SHA1

      d9abeda22d30f5c740b3ca9d3485071587ecdd7c

    • SHA256

      ed7f6da7160f3652fcaa289cd46b42349fdb059812a43dc925e5abfe1995d7ef

    • SHA512

      1d46f60a6c5dcaa78ca9a7e9c50aac0dce0af876e5b7e904b3c0777f334b720162c4a04a6c3a3464509fa6e4f99f67c284642cb0e591585bc598a596a6690b88

    • SSDEEP

      6144:BA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:BATuTAnKGwUAW3ycQqgn

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks