General

  • Target

    b809980a4d1c1332ebe42fde640b491ce28d3ca13e4d19322173849530cda055N

  • Size

    89KB

  • Sample

    241108-zj1w2azape

  • MD5

    c15e36b599f9ebc06fb6acbad75f9660

  • SHA1

    eadbe3c2b58dfd39edc7764ceb18131210d97267

  • SHA256

    b809980a4d1c1332ebe42fde640b491ce28d3ca13e4d19322173849530cda055

  • SHA512

    da64d4ea7370397ae53ef7aeeaa1976a7d2b3baae959fb51669bf54c208fd7fd2eec9290eea76f26ee592d328031b186c4f62c68ae6f35fe90645a25c6d4d062

  • SSDEEP

    1536:11+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:H+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      b809980a4d1c1332ebe42fde640b491ce28d3ca13e4d19322173849530cda055N

    • Size

      89KB

    • MD5

      c15e36b599f9ebc06fb6acbad75f9660

    • SHA1

      eadbe3c2b58dfd39edc7764ceb18131210d97267

    • SHA256

      b809980a4d1c1332ebe42fde640b491ce28d3ca13e4d19322173849530cda055

    • SHA512

      da64d4ea7370397ae53ef7aeeaa1976a7d2b3baae959fb51669bf54c208fd7fd2eec9290eea76f26ee592d328031b186c4f62c68ae6f35fe90645a25c6d4d062

    • SSDEEP

      1536:11+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:H+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks