General

  • Target

    b721853234d5d375255abd9fa3ebdeea33da8679d3c2a9fe38f8e4b7c47e2b13.exe

  • Size

    160KB

  • Sample

    250224-nwk6kazrv6

  • MD5

    231109d85481022566878059902f0989

  • SHA1

    c6ebe76a4a7d8dcaef87bce64ef9eef179355fc4

  • SHA256

    b721853234d5d375255abd9fa3ebdeea33da8679d3c2a9fe38f8e4b7c47e2b13

  • SHA512

    74008376fbb86ba4c65e7880f977a22eef21346ce4cb2e4bf2309d26f0fa30d9a4513630d11b65a63d1bba955f7ae523e3f0baa159e1d586f84d569b52bdaa4a

  • SSDEEP

    1536:3EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:UY+4MiIkLZJNAQ9J6ve

Malware Config

Targets

    • Target

      b721853234d5d375255abd9fa3ebdeea33da8679d3c2a9fe38f8e4b7c47e2b13.exe

    • Size

      160KB

    • MD5

      231109d85481022566878059902f0989

    • SHA1

      c6ebe76a4a7d8dcaef87bce64ef9eef179355fc4

    • SHA256

      b721853234d5d375255abd9fa3ebdeea33da8679d3c2a9fe38f8e4b7c47e2b13

    • SHA512

      74008376fbb86ba4c65e7880f977a22eef21346ce4cb2e4bf2309d26f0fa30d9a4513630d11b65a63d1bba955f7ae523e3f0baa159e1d586f84d569b52bdaa4a

    • SSDEEP

      1536:3EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:UY+4MiIkLZJNAQ9J6ve

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks