General

  • Target

    23a38d74c87efa0d0b9272f691196c9513beab6cb688a674a0ed1b463462a290N

  • Size

    110KB

  • Sample

    241108-w9yb2sxejr

  • MD5

    89e5f0c11f7f0007fa2a09e3cab8dd50

  • SHA1

    5885d95969d011e077c1c55d95f5e55a0776f782

  • SHA256

    23a38d74c87efa0d0b9272f691196c9513beab6cb688a674a0ed1b463462a290

  • SHA512

    6ee3de90823b86fbee7bfda215f0e4c855d1de9e0e1f59b56c688c0a31b305b0264f88442f322ae45e02ef3c2fd0b00d82acfcac10d0b2f73dd99c1843574694

  • SSDEEP

    1536:xiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:xiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      23a38d74c87efa0d0b9272f691196c9513beab6cb688a674a0ed1b463462a290N

    • Size

      110KB

    • MD5

      89e5f0c11f7f0007fa2a09e3cab8dd50

    • SHA1

      5885d95969d011e077c1c55d95f5e55a0776f782

    • SHA256

      23a38d74c87efa0d0b9272f691196c9513beab6cb688a674a0ed1b463462a290

    • SHA512

      6ee3de90823b86fbee7bfda215f0e4c855d1de9e0e1f59b56c688c0a31b305b0264f88442f322ae45e02ef3c2fd0b00d82acfcac10d0b2f73dd99c1843574694

    • SSDEEP

      1536:xiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:xiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks