General

  • Target

    16795bfb2915ca8f34a4d88a3f13acb67c101cf612a76b07be560258b4c79801

  • Size

    110KB

  • Sample

    241026-xqzansvqhk

  • MD5

    171263df5f4c6155a81f82c117236fc4

  • SHA1

    6035e4b5be33fc5553fba93de7d14e0716b0c04f

  • SHA256

    16795bfb2915ca8f34a4d88a3f13acb67c101cf612a76b07be560258b4c79801

  • SHA512

    12f3464374716046339058217cb89ad99194a110c5811d6c27d0c3425006fc14035c1efbe807a6d645f57e96a07a20302ded65427fa74ab4b3ee395630440915

  • SSDEEP

    1536:CiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:CiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      16795bfb2915ca8f34a4d88a3f13acb67c101cf612a76b07be560258b4c79801

    • Size

      110KB

    • MD5

      171263df5f4c6155a81f82c117236fc4

    • SHA1

      6035e4b5be33fc5553fba93de7d14e0716b0c04f

    • SHA256

      16795bfb2915ca8f34a4d88a3f13acb67c101cf612a76b07be560258b4c79801

    • SHA512

      12f3464374716046339058217cb89ad99194a110c5811d6c27d0c3425006fc14035c1efbe807a6d645f57e96a07a20302ded65427fa74ab4b3ee395630440915

    • SSDEEP

      1536:CiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:CiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks