General

  • Target

    d812b7b575181b189d17a038870222bdf3ef2b4706d3087487a5454783165f73.exe

  • Size

    89KB

  • Sample

    250224-r5hzcaxrw2

  • MD5

    f79f9ca6f4ef2d33a2bf7d3813a01ac6

  • SHA1

    7d0fbd6e3cfe8d30c426afb120872584c270bf91

  • SHA256

    d812b7b575181b189d17a038870222bdf3ef2b4706d3087487a5454783165f73

  • SHA512

    bd6bd121837d75e35fca235dcd0c2a82a119252070342667af4e316a483db0a0f0ac331f629fa9ffc6e2ba69dd5b9f07e99e2e8c771132cd3a9d5d4b6a5d731f

  • SSDEEP

    1536:B1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7u:L+4MJIkLZJNAQ9Jo9u

Malware Config

Targets

    • Target

      d812b7b575181b189d17a038870222bdf3ef2b4706d3087487a5454783165f73.exe

    • Size

      89KB

    • MD5

      f79f9ca6f4ef2d33a2bf7d3813a01ac6

    • SHA1

      7d0fbd6e3cfe8d30c426afb120872584c270bf91

    • SHA256

      d812b7b575181b189d17a038870222bdf3ef2b4706d3087487a5454783165f73

    • SHA512

      bd6bd121837d75e35fca235dcd0c2a82a119252070342667af4e316a483db0a0f0ac331f629fa9ffc6e2ba69dd5b9f07e99e2e8c771132cd3a9d5d4b6a5d731f

    • SSDEEP

      1536:B1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7u:L+4MJIkLZJNAQ9Jo9u

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks