General

  • Target

    0b41a0ebf756c87cce3c9abd1ce72ca98dc6c69620499c692deb4f354b4760c3

  • Size

    160KB

  • Sample

    240903-w798tstbnk

  • MD5

    21cbf28dd23d2bdeed8020f639a918cf

  • SHA1

    3abfc8c2a2ea4b2bdd1de0aa4df365f00faf50e8

  • SHA256

    0b41a0ebf756c87cce3c9abd1ce72ca98dc6c69620499c692deb4f354b4760c3

  • SHA512

    433404f95a6f0888d39e13cff50e2267e944f691f9f7514097bdb029d5b8753e2ae4ff6a4840514ff68f64b61e908c6a23527f7d3294d5a9cb502d898edc6ce0

  • SSDEEP

    1536:vEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:cY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      0b41a0ebf756c87cce3c9abd1ce72ca98dc6c69620499c692deb4f354b4760c3

    • Size

      160KB

    • MD5

      21cbf28dd23d2bdeed8020f639a918cf

    • SHA1

      3abfc8c2a2ea4b2bdd1de0aa4df365f00faf50e8

    • SHA256

      0b41a0ebf756c87cce3c9abd1ce72ca98dc6c69620499c692deb4f354b4760c3

    • SHA512

      433404f95a6f0888d39e13cff50e2267e944f691f9f7514097bdb029d5b8753e2ae4ff6a4840514ff68f64b61e908c6a23527f7d3294d5a9cb502d898edc6ce0

    • SSDEEP

      1536:vEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:cY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks