General

  • Target

    c4eff596a46465bac0cf68481ade49d555039e3a92fa5e54273f72465324f9e1.exe

  • Size

    89KB

  • Sample

    250216-xdzexavpfm

  • MD5

    e912bd4f8dcbabf2c4c82deab7c050c7

  • SHA1

    845f6de3e730aaa2173710acce89d73d5e1ad474

  • SHA256

    c4eff596a46465bac0cf68481ade49d555039e3a92fa5e54273f72465324f9e1

  • SHA512

    deb1f21c3ca091e6f25faae57c229d5cd90ebc05aa0895d8192a11283842acc129c1a6e8e4adbaf14262d36d6cc7c739e050a77e72c515046dc8fa853886c3ab

  • SSDEEP

    1536:q9o65gQK3Zm+Mt9RV5O8oQ9cXFunGm6ManhFLnBqHan6owwosTk8vxA0:q9o6fK2XqXQwhnHlqQo8Lvy0

Malware Config

Targets

    • Target

      c4eff596a46465bac0cf68481ade49d555039e3a92fa5e54273f72465324f9e1.exe

    • Size

      89KB

    • MD5

      e912bd4f8dcbabf2c4c82deab7c050c7

    • SHA1

      845f6de3e730aaa2173710acce89d73d5e1ad474

    • SHA256

      c4eff596a46465bac0cf68481ade49d555039e3a92fa5e54273f72465324f9e1

    • SHA512

      deb1f21c3ca091e6f25faae57c229d5cd90ebc05aa0895d8192a11283842acc129c1a6e8e4adbaf14262d36d6cc7c739e050a77e72c515046dc8fa853886c3ab

    • SSDEEP

      1536:q9o65gQK3Zm+Mt9RV5O8oQ9cXFunGm6ManhFLnBqHan6owwosTk8vxA0:q9o6fK2XqXQwhnHlqQo8Lvy0

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks