General

  • Target

    6e11eb8bd0b8861e9e207cf17f156a41c5badecd0e184f4ee052b7853cbe184fN

  • Size

    45KB

  • Sample

    241031-dws63axkhs

  • MD5

    b3d62eeda9b5f74bfd3c7266b441ebd0

  • SHA1

    8f5f3f3fb41a9d0d6b0564d6bb3ffbcd1a7e0377

  • SHA256

    6e11eb8bd0b8861e9e207cf17f156a41c5badecd0e184f4ee052b7853cbe184f

  • SHA512

    b956bee086040e32c71cddd37cd55b7e4116149f27c1ec9c8859c73f3616dc09f87e395a5a10f73acea7765c0f7384c08d262fe7e180a19ee825ab120550a1b8

  • SSDEEP

    768:uhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:isWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      6e11eb8bd0b8861e9e207cf17f156a41c5badecd0e184f4ee052b7853cbe184fN

    • Size

      45KB

    • MD5

      b3d62eeda9b5f74bfd3c7266b441ebd0

    • SHA1

      8f5f3f3fb41a9d0d6b0564d6bb3ffbcd1a7e0377

    • SHA256

      6e11eb8bd0b8861e9e207cf17f156a41c5badecd0e184f4ee052b7853cbe184f

    • SHA512

      b956bee086040e32c71cddd37cd55b7e4116149f27c1ec9c8859c73f3616dc09f87e395a5a10f73acea7765c0f7384c08d262fe7e180a19ee825ab120550a1b8

    • SSDEEP

      768:uhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:isWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks