General

  • Target

    76945c89b7635c63bbf89904c934ac45eb623512dbcad04be4e9bd32ebf50d2aN

  • Size

    110KB

  • Sample

    241028-3dfkpaxndt

  • MD5

    5f0f20da6c147174ff5a627574c17a30

  • SHA1

    1eca72078d40c0b19725a3c28721cbc323199d65

  • SHA256

    76945c89b7635c63bbf89904c934ac45eb623512dbcad04be4e9bd32ebf50d2a

  • SHA512

    370433514af4dc7dd89a186d14d30f790d47097baac98d92381d5a415dff460b7c2872838893911e6e215c7f9859d78ad46c6298f73352b90d02abcd16665418

  • SSDEEP

    1536:IiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:IiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      76945c89b7635c63bbf89904c934ac45eb623512dbcad04be4e9bd32ebf50d2aN

    • Size

      110KB

    • MD5

      5f0f20da6c147174ff5a627574c17a30

    • SHA1

      1eca72078d40c0b19725a3c28721cbc323199d65

    • SHA256

      76945c89b7635c63bbf89904c934ac45eb623512dbcad04be4e9bd32ebf50d2a

    • SHA512

      370433514af4dc7dd89a186d14d30f790d47097baac98d92381d5a415dff460b7c2872838893911e6e215c7f9859d78ad46c6298f73352b90d02abcd16665418

    • SSDEEP

      1536:IiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:IiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks