General

  • Target

    d89564d282d4b3b809698dd8205fc2c58181bfc4a1e00d50aeb8ec8a9f5c885aN

  • Size

    113KB

  • Sample

    241103-hrn4rs1kfj

  • MD5

    b31a2f406b719a947105e325d02e7c60

  • SHA1

    4283abc67b5a35cb63f6ed8256bfeaa8412ac2a1

  • SHA256

    d89564d282d4b3b809698dd8205fc2c58181bfc4a1e00d50aeb8ec8a9f5c885a

  • SHA512

    c57bd247728b98a62e57c82926105c488ba40b7e587f0bf854a04542a5ea8024ba14321b0e8fde59c29d2f304db348c4791e8448b5e73faf0ed78c4480a00a31

  • SSDEEP

    1536:uiLOvRmmQegJfBbmAQ256/ZrwWhwqjhurmKFcbL86WV0E:uiyvRmDLs/ZrwWjjAqGcfzWH

Malware Config

Targets

    • Target

      d89564d282d4b3b809698dd8205fc2c58181bfc4a1e00d50aeb8ec8a9f5c885aN

    • Size

      113KB

    • MD5

      b31a2f406b719a947105e325d02e7c60

    • SHA1

      4283abc67b5a35cb63f6ed8256bfeaa8412ac2a1

    • SHA256

      d89564d282d4b3b809698dd8205fc2c58181bfc4a1e00d50aeb8ec8a9f5c885a

    • SHA512

      c57bd247728b98a62e57c82926105c488ba40b7e587f0bf854a04542a5ea8024ba14321b0e8fde59c29d2f304db348c4791e8448b5e73faf0ed78c4480a00a31

    • SSDEEP

      1536:uiLOvRmmQegJfBbmAQ256/ZrwWhwqjhurmKFcbL86WV0E:uiyvRmDLs/ZrwWjjAqGcfzWH

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks