General

  • Target

    0354b8ff0c3a885f08d58ddaf26861e7d2831b7f3708a4c98550211d3ec953c2N

  • Size

    89KB

  • Sample

    241027-m7864axgnk

  • MD5

    d0e42c5d316c07efdc018e26af3478f0

  • SHA1

    39c94220c85f587f65b9e3f3838b89669d39be9d

  • SHA256

    0354b8ff0c3a885f08d58ddaf26861e7d2831b7f3708a4c98550211d3ec953c2

  • SHA512

    9d8788593c4deb8563126872baf5175aad8c5cc15f0f56d95fe231dd226a350d2585c7353a162477aa28df5f060a0da712655adac0872459f525ef13ebedcd01

  • SSDEEP

    1536:X1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:F+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      0354b8ff0c3a885f08d58ddaf26861e7d2831b7f3708a4c98550211d3ec953c2N

    • Size

      89KB

    • MD5

      d0e42c5d316c07efdc018e26af3478f0

    • SHA1

      39c94220c85f587f65b9e3f3838b89669d39be9d

    • SHA256

      0354b8ff0c3a885f08d58ddaf26861e7d2831b7f3708a4c98550211d3ec953c2

    • SHA512

      9d8788593c4deb8563126872baf5175aad8c5cc15f0f56d95fe231dd226a350d2585c7353a162477aa28df5f060a0da712655adac0872459f525ef13ebedcd01

    • SSDEEP

      1536:X1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:F+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks