General

  • Target

    e6ea7c6669ecea023be03a5d1a893ac2a3670d7b1d0ef2a07682dff44c7b6950N

  • Size

    110KB

  • Sample

    241025-xzacxa1mds

  • MD5

    77a393cab0bb87eb4692436cb7142100

  • SHA1

    c76f8cd9d48909d951509176061ff960d3d89819

  • SHA256

    e6ea7c6669ecea023be03a5d1a893ac2a3670d7b1d0ef2a07682dff44c7b6950

  • SHA512

    a7cc90b539b29fc48d9950e23d76c299f46225883301c584b3bfc172856761fa4fec3a7b5598493f18d6cf6819cc6b2fe8a76d092fe0243ae7069e3c52a7eb54

  • SSDEEP

    1536:giLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:giyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      e6ea7c6669ecea023be03a5d1a893ac2a3670d7b1d0ef2a07682dff44c7b6950N

    • Size

      110KB

    • MD5

      77a393cab0bb87eb4692436cb7142100

    • SHA1

      c76f8cd9d48909d951509176061ff960d3d89819

    • SHA256

      e6ea7c6669ecea023be03a5d1a893ac2a3670d7b1d0ef2a07682dff44c7b6950

    • SHA512

      a7cc90b539b29fc48d9950e23d76c299f46225883301c584b3bfc172856761fa4fec3a7b5598493f18d6cf6819cc6b2fe8a76d092fe0243ae7069e3c52a7eb54

    • SSDEEP

      1536:giLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:giyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks