General

  • Target

    28da2514f32d490d5622f867245016eaf8e6b9c19978ab05269bcbc61c6e34a5N

  • Size

    110KB

  • Sample

    241031-egdnhaxqgt

  • MD5

    c9a0bc301c5edd374a874bce25a5b4f0

  • SHA1

    7c723cb743555d807fe60cd9ad045edb90901a96

  • SHA256

    28da2514f32d490d5622f867245016eaf8e6b9c19978ab05269bcbc61c6e34a5

  • SHA512

    805aa24130537081c3d506a26e450a4fe5b902b616debf48785af3ed62b574525eeb0e7c6b61a3e893919de73518d1a5393facc1c34083c61c003bcbb73e9780

  • SSDEEP

    1536:1iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:1iyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      28da2514f32d490d5622f867245016eaf8e6b9c19978ab05269bcbc61c6e34a5N

    • Size

      110KB

    • MD5

      c9a0bc301c5edd374a874bce25a5b4f0

    • SHA1

      7c723cb743555d807fe60cd9ad045edb90901a96

    • SHA256

      28da2514f32d490d5622f867245016eaf8e6b9c19978ab05269bcbc61c6e34a5

    • SHA512

      805aa24130537081c3d506a26e450a4fe5b902b616debf48785af3ed62b574525eeb0e7c6b61a3e893919de73518d1a5393facc1c34083c61c003bcbb73e9780

    • SSDEEP

      1536:1iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:1iyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks