General

  • Target

    9a97aa8e0989658584e7231444875cd9620bd54a15431d1b7db79899a13dde51.exe

  • Size

    225KB

  • Sample

    250217-erskeazlgk

  • MD5

    7fbfc6a5adfa0a7a5bed45cf14632947

  • SHA1

    92d07692502f7f69e91ab96f608bbafd91d43305

  • SHA256

    9a97aa8e0989658584e7231444875cd9620bd54a15431d1b7db79899a13dde51

  • SHA512

    91d217823663b9a01e73f9397909b35e39077e281e36bcde8923845c67bfc5f036a758bc1c345cb76e2b806f43d22f6bec44e5c9b0c9d014884f21c3d532baf9

  • SSDEEP

    6144:JA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpY0:JATuTAnKGwUAW3ycQqgF

Malware Config

Targets

    • Target

      9a97aa8e0989658584e7231444875cd9620bd54a15431d1b7db79899a13dde51.exe

    • Size

      225KB

    • MD5

      7fbfc6a5adfa0a7a5bed45cf14632947

    • SHA1

      92d07692502f7f69e91ab96f608bbafd91d43305

    • SHA256

      9a97aa8e0989658584e7231444875cd9620bd54a15431d1b7db79899a13dde51

    • SHA512

      91d217823663b9a01e73f9397909b35e39077e281e36bcde8923845c67bfc5f036a758bc1c345cb76e2b806f43d22f6bec44e5c9b0c9d014884f21c3d532baf9

    • SSDEEP

      6144:JA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpY0:JATuTAnKGwUAW3ycQqgF

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks