General

  • Target

    b50475628568663d912a381ff7021b57be91cee616e3398bfef348963ed07085N

  • Size

    110KB

  • Sample

    241102-vwqjls1bqq

  • MD5

    bf11014e83b82b5eb28aef25247cd3e0

  • SHA1

    c8acd72119d1209b729495c9e6c79f1d743d48bc

  • SHA256

    b50475628568663d912a381ff7021b57be91cee616e3398bfef348963ed07085

  • SHA512

    c89f5a083e7c05f33ffc0fc5a42dc38c57cb3d64a80868955a51c6f3c01e2dff2c0ae88464f7bfd9fc0bcb20e8da3700b3692b9d2117e0eb051c6f18a2f3950a

  • SSDEEP

    1536:EiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:EiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      b50475628568663d912a381ff7021b57be91cee616e3398bfef348963ed07085N

    • Size

      110KB

    • MD5

      bf11014e83b82b5eb28aef25247cd3e0

    • SHA1

      c8acd72119d1209b729495c9e6c79f1d743d48bc

    • SHA256

      b50475628568663d912a381ff7021b57be91cee616e3398bfef348963ed07085

    • SHA512

      c89f5a083e7c05f33ffc0fc5a42dc38c57cb3d64a80868955a51c6f3c01e2dff2c0ae88464f7bfd9fc0bcb20e8da3700b3692b9d2117e0eb051c6f18a2f3950a

    • SSDEEP

      1536:EiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:EiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks