General

  • Target

    a1da432fce5e9fd6f7e9bb8ccb2cf428fe969a1e48add67ccb9a5f4d37a56652N.exe

  • Size

    225KB

  • Sample

    250217-e2b1eazqbs

  • MD5

    e508cb45e3164db9e506cfccb72be920

  • SHA1

    ab62d8cd34ebc2f4ea4ee746745a65696655cc5a

  • SHA256

    a1da432fce5e9fd6f7e9bb8ccb2cf428fe969a1e48add67ccb9a5f4d37a56652

  • SHA512

    7e6a50ee6e40e1407ee42b4070c63339398c7133341c3706bbf66c0042218f0d2b38437a921bfab3ec5bd88e02f3a3f040827796f1983197c82e59f8175fffe6

  • SSDEEP

    6144:oA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:oATuTAnKGwUAW3ycQqgf

Malware Config

Targets

    • Target

      a1da432fce5e9fd6f7e9bb8ccb2cf428fe969a1e48add67ccb9a5f4d37a56652N.exe

    • Size

      225KB

    • MD5

      e508cb45e3164db9e506cfccb72be920

    • SHA1

      ab62d8cd34ebc2f4ea4ee746745a65696655cc5a

    • SHA256

      a1da432fce5e9fd6f7e9bb8ccb2cf428fe969a1e48add67ccb9a5f4d37a56652

    • SHA512

      7e6a50ee6e40e1407ee42b4070c63339398c7133341c3706bbf66c0042218f0d2b38437a921bfab3ec5bd88e02f3a3f040827796f1983197c82e59f8175fffe6

    • SSDEEP

      6144:oA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:oATuTAnKGwUAW3ycQqgf

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks