General

  • Target

    a540fd5ad699ba6258000f835aeaf9226c5e790d69eda271c80f94b4199d4df9N.exe

  • Size

    89KB

  • Sample

    250224-zjbbdavkw3

  • MD5

    8a824aad22835951d80fd45719e0b590

  • SHA1

    bb1ba16ddb81f21c609367425432f35eb585561b

  • SHA256

    a540fd5ad699ba6258000f835aeaf9226c5e790d69eda271c80f94b4199d4df9

  • SHA512

    48f36307eba9d16973a47c09914ffe0faf1a7f2da16e34d14b258931d8b216dd762cbefc79eda0a7be68b9e804ef2f077727094df80c77b8cb2497ffa84c374f

  • SSDEEP

    1536:B1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:L+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      a540fd5ad699ba6258000f835aeaf9226c5e790d69eda271c80f94b4199d4df9N.exe

    • Size

      89KB

    • MD5

      8a824aad22835951d80fd45719e0b590

    • SHA1

      bb1ba16ddb81f21c609367425432f35eb585561b

    • SHA256

      a540fd5ad699ba6258000f835aeaf9226c5e790d69eda271c80f94b4199d4df9

    • SHA512

      48f36307eba9d16973a47c09914ffe0faf1a7f2da16e34d14b258931d8b216dd762cbefc79eda0a7be68b9e804ef2f077727094df80c77b8cb2497ffa84c374f

    • SSDEEP

      1536:B1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:L+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks