General

  • Target

    42012e18be057d08ac24afe62e0473db2d37bbda04640220e4b25683f6da4e1cN

  • Size

    110KB

  • Sample

    241108-m8c52s1enc

  • MD5

    8abeac67618c4ba9eb50984f33165bd0

  • SHA1

    10f486533e8ae2e05a6f673fa216fe9c80043c2d

  • SHA256

    42012e18be057d08ac24afe62e0473db2d37bbda04640220e4b25683f6da4e1c

  • SHA512

    a8d0af018962fb1d3e11d79ff0983dd30abc3b040f59d283551fa6f351190cf93b9f375dc34c2737af28d06c878e739e44592c3bc97a8bc99bb69b253ddf65bd

  • SSDEEP

    1536:miLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:miyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      42012e18be057d08ac24afe62e0473db2d37bbda04640220e4b25683f6da4e1cN

    • Size

      110KB

    • MD5

      8abeac67618c4ba9eb50984f33165bd0

    • SHA1

      10f486533e8ae2e05a6f673fa216fe9c80043c2d

    • SHA256

      42012e18be057d08ac24afe62e0473db2d37bbda04640220e4b25683f6da4e1c

    • SHA512

      a8d0af018962fb1d3e11d79ff0983dd30abc3b040f59d283551fa6f351190cf93b9f375dc34c2737af28d06c878e739e44592c3bc97a8bc99bb69b253ddf65bd

    • SSDEEP

      1536:miLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:miyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks