General

  • Target

    96911ff54c01adb5320df2eb6997039be5af447bb91a3e3c21297456e59be66cN

  • Size

    110KB

  • Sample

    241025-zvyk2ssmf1

  • MD5

    1f5ee15187ed47cb55326b9b76946400

  • SHA1

    ea025350434a184fcbd33b3a6ffb33a34bacb697

  • SHA256

    96911ff54c01adb5320df2eb6997039be5af447bb91a3e3c21297456e59be66c

  • SHA512

    461435c1cd5c60a8f4dc278ba789a384eff2e715deeb770409725f8750199225d047d6b90453caf271c7f0236da9e3e428bd670263df29bbd6132189018bc9b7

  • SSDEEP

    1536:WiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:WiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      96911ff54c01adb5320df2eb6997039be5af447bb91a3e3c21297456e59be66cN

    • Size

      110KB

    • MD5

      1f5ee15187ed47cb55326b9b76946400

    • SHA1

      ea025350434a184fcbd33b3a6ffb33a34bacb697

    • SHA256

      96911ff54c01adb5320df2eb6997039be5af447bb91a3e3c21297456e59be66c

    • SHA512

      461435c1cd5c60a8f4dc278ba789a384eff2e715deeb770409725f8750199225d047d6b90453caf271c7f0236da9e3e428bd670263df29bbd6132189018bc9b7

    • SSDEEP

      1536:WiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:WiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks