General

  • Target

    18e7a21dce71c0a4e6aa8c0446d12535363ed2b2ef82afc0b3a77be53a9fd61fN

  • Size

    49KB

  • Sample

    241107-24381ayraz

  • MD5

    bdbacdddcfb6d8df09ebceb205671760

  • SHA1

    c44cfa378d0d8d679c5fc29f96d1975b8ce50de0

  • SHA256

    18e7a21dce71c0a4e6aa8c0446d12535363ed2b2ef82afc0b3a77be53a9fd61f

  • SHA512

    398c59f1776bc1dc8a7ad62c3d0e7dc9f903b45d3e36fc5189e286f5bb468f17fe3801c3edd76a5adf4b535168bb7cd8d97d24f84438577d37557cc2db4925ec

  • SSDEEP

    1536:5OBLXNqgzf2v6b6NkXklZlogHGe9eBXW:5YLduv6OqXIlogmjW

Malware Config

Targets

    • Target

      18e7a21dce71c0a4e6aa8c0446d12535363ed2b2ef82afc0b3a77be53a9fd61fN

    • Size

      49KB

    • MD5

      bdbacdddcfb6d8df09ebceb205671760

    • SHA1

      c44cfa378d0d8d679c5fc29f96d1975b8ce50de0

    • SHA256

      18e7a21dce71c0a4e6aa8c0446d12535363ed2b2ef82afc0b3a77be53a9fd61f

    • SHA512

      398c59f1776bc1dc8a7ad62c3d0e7dc9f903b45d3e36fc5189e286f5bb468f17fe3801c3edd76a5adf4b535168bb7cd8d97d24f84438577d37557cc2db4925ec

    • SSDEEP

      1536:5OBLXNqgzf2v6b6NkXklZlogHGe9eBXW:5YLduv6OqXIlogmjW

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks