General

  • Target

    e705d48ff883c7c13fc74031d653211cbd4043989af58636f6213b4e3e109e1e

  • Size

    45KB

  • Sample

    241103-gbp6fswfqf

  • MD5

    a23101d39d1c17423c9e889a0e77b1fe

  • SHA1

    95ac78074c82a9c393d1d09f98e4b0cbfd8c05e1

  • SHA256

    e705d48ff883c7c13fc74031d653211cbd4043989af58636f6213b4e3e109e1e

  • SHA512

    26524e9f445181269639c3f5f63864bfee379ddf42bd69cc21937e4cbcdf2da51160ed7ffb5b500d45bddf146754f0f3702d923f895287c329e5c4ce779ad0b2

  • SSDEEP

    768:ChP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:usWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      e705d48ff883c7c13fc74031d653211cbd4043989af58636f6213b4e3e109e1e

    • Size

      45KB

    • MD5

      a23101d39d1c17423c9e889a0e77b1fe

    • SHA1

      95ac78074c82a9c393d1d09f98e4b0cbfd8c05e1

    • SHA256

      e705d48ff883c7c13fc74031d653211cbd4043989af58636f6213b4e3e109e1e

    • SHA512

      26524e9f445181269639c3f5f63864bfee379ddf42bd69cc21937e4cbcdf2da51160ed7ffb5b500d45bddf146754f0f3702d923f895287c329e5c4ce779ad0b2

    • SSDEEP

      768:ChP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:usWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks