General

  • Target

    3aacda58dee993c6670f2c0844e70e5117d7261fea00ebf802bf729fcd8317d6N

  • Size

    45KB

  • Sample

    241106-rzn86ssenl

  • MD5

    e4d03b04ab4fb0a87d0cbcc3e6455170

  • SHA1

    3b4b98fa6e6fe43ccf547f66848c42b2928722b8

  • SHA256

    3aacda58dee993c6670f2c0844e70e5117d7261fea00ebf802bf729fcd8317d6

  • SHA512

    67762ff62fd9c4e38fdde82a5ba10e69c5c9ad7cf656f8e315f1dcb4ab64ba758b3df7eaee956e1531d5d1036ea0c49da13390887103ef0fd3ea6042a4a61d8a

  • SSDEEP

    768:2hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:asWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      3aacda58dee993c6670f2c0844e70e5117d7261fea00ebf802bf729fcd8317d6N

    • Size

      45KB

    • MD5

      e4d03b04ab4fb0a87d0cbcc3e6455170

    • SHA1

      3b4b98fa6e6fe43ccf547f66848c42b2928722b8

    • SHA256

      3aacda58dee993c6670f2c0844e70e5117d7261fea00ebf802bf729fcd8317d6

    • SHA512

      67762ff62fd9c4e38fdde82a5ba10e69c5c9ad7cf656f8e315f1dcb4ab64ba758b3df7eaee956e1531d5d1036ea0c49da13390887103ef0fd3ea6042a4a61d8a

    • SSDEEP

      768:2hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:asWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks