General

  • Target

    Trojan.Win32.Tinba.pza700028819406ff048b32106ec7f82656f4ef0b9c637e33761f75549f3bb2ea2N

  • Size

    34KB

  • Sample

    240916-n8m6pawgkn

  • MD5

    170c3cb80e1d26438d071ae886c0bcf0

  • SHA1

    7a8ea7b6e8826286754870705bf73a399af52bdd

  • SHA256

    a700028819406ff048b32106ec7f82656f4ef0b9c637e33761f75549f3bb2ea2

  • SHA512

    c53c61d708314563654cc60742a8ced996643c9b16f610776ef9a8b02f7d57d0ee29a5d6ae2b2315f161f570645d9cd9ee62596258751587ecc23182d2e93763

  • SSDEEP

    768:Ap22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:ApYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      Trojan.Win32.Tinba.pza700028819406ff048b32106ec7f82656f4ef0b9c637e33761f75549f3bb2ea2N

    • Size

      34KB

    • MD5

      170c3cb80e1d26438d071ae886c0bcf0

    • SHA1

      7a8ea7b6e8826286754870705bf73a399af52bdd

    • SHA256

      a700028819406ff048b32106ec7f82656f4ef0b9c637e33761f75549f3bb2ea2

    • SHA512

      c53c61d708314563654cc60742a8ced996643c9b16f610776ef9a8b02f7d57d0ee29a5d6ae2b2315f161f570645d9cd9ee62596258751587ecc23182d2e93763

    • SSDEEP

      768:Ap22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:ApYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks