General

  • Target

    edbfaf42d0e49ab60f72de01bb3b56629a36048b3bce46d7c22545f902e1dd38

  • Size

    89KB

  • Sample

    241031-hm4zestqdr

  • MD5

    96cbb2fc5b484a76ea49d10ff7d7ffe6

  • SHA1

    13bab90afe45d7641bcbd2c7f2991edb1855bf97

  • SHA256

    edbfaf42d0e49ab60f72de01bb3b56629a36048b3bce46d7c22545f902e1dd38

  • SHA512

    cc4c30708d701a19f56d7134d906c5d601b0fa692771df0e21ef65d07414dfbdb46726c05d1c3564feb6d5796b3c3805c8f1c42648f03b36d29d768b7a6d29a7

  • SSDEEP

    1536:Y1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:M+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      edbfaf42d0e49ab60f72de01bb3b56629a36048b3bce46d7c22545f902e1dd38

    • Size

      89KB

    • MD5

      96cbb2fc5b484a76ea49d10ff7d7ffe6

    • SHA1

      13bab90afe45d7641bcbd2c7f2991edb1855bf97

    • SHA256

      edbfaf42d0e49ab60f72de01bb3b56629a36048b3bce46d7c22545f902e1dd38

    • SHA512

      cc4c30708d701a19f56d7134d906c5d601b0fa692771df0e21ef65d07414dfbdb46726c05d1c3564feb6d5796b3c3805c8f1c42648f03b36d29d768b7a6d29a7

    • SSDEEP

      1536:Y1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:M+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks