General

  • Target

    36946b6ed48733c40af0e2bfb4542848ec61ffd46527984f3ff666fec04bef35N

  • Size

    89KB

  • Sample

    241108-jlmt7a1kgr

  • MD5

    2e678e6b62adadbf51923b89598e52d0

  • SHA1

    727cf1a7a28a17916e66aae82bad9d8fc64cfa37

  • SHA256

    36946b6ed48733c40af0e2bfb4542848ec61ffd46527984f3ff666fec04bef35

  • SHA512

    b16f2b23f7bb0dfa64c003860cb208b671ea52aa719e1cb9bb75133457b2312ba66d6115522628dae0e88cd6d56d6b4458ccde4d049bf06ec2829ba9d815197d

  • SSDEEP

    1536:y1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:a+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      36946b6ed48733c40af0e2bfb4542848ec61ffd46527984f3ff666fec04bef35N

    • Size

      89KB

    • MD5

      2e678e6b62adadbf51923b89598e52d0

    • SHA1

      727cf1a7a28a17916e66aae82bad9d8fc64cfa37

    • SHA256

      36946b6ed48733c40af0e2bfb4542848ec61ffd46527984f3ff666fec04bef35

    • SHA512

      b16f2b23f7bb0dfa64c003860cb208b671ea52aa719e1cb9bb75133457b2312ba66d6115522628dae0e88cd6d56d6b4458ccde4d049bf06ec2829ba9d815197d

    • SSDEEP

      1536:y1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:a+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks