General

  • Target

    1a49ffdef88b4127f3472e791381b16a3d5da82e094b31b70460d9d02b04f8f1N.exe

  • Size

    160KB

  • Sample

    250224-refraswmx7

  • MD5

    2034cd951fc5f62c86d42ca3d08f75d0

  • SHA1

    25cd22b345796b1f8bf7b7094708a49568ce07b9

  • SHA256

    1a49ffdef88b4127f3472e791381b16a3d5da82e094b31b70460d9d02b04f8f1

  • SHA512

    6438ab62943824aa701f8f4d25cc14cfab0a1024ed6b1908099ff98339874581186cea28314079460477630c0a0cbafc6300456cd811cd1c298af5bd6b5b19d8

  • SSDEEP

    1536:3EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:UY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      1a49ffdef88b4127f3472e791381b16a3d5da82e094b31b70460d9d02b04f8f1N.exe

    • Size

      160KB

    • MD5

      2034cd951fc5f62c86d42ca3d08f75d0

    • SHA1

      25cd22b345796b1f8bf7b7094708a49568ce07b9

    • SHA256

      1a49ffdef88b4127f3472e791381b16a3d5da82e094b31b70460d9d02b04f8f1

    • SHA512

      6438ab62943824aa701f8f4d25cc14cfab0a1024ed6b1908099ff98339874581186cea28314079460477630c0a0cbafc6300456cd811cd1c298af5bd6b5b19d8

    • SSDEEP

      1536:3EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:UY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks