General

  • Target

    a6b5e60bfcc893ccc19e5535c27510093851b6bdaa76a86b489d898c3a3004adN

  • Size

    89KB

  • Sample

    241109-dv9seswfpg

  • MD5

    ad3bfabe042476fd00c9430dfd293d60

  • SHA1

    a3bd0dbb898bcd82c16190b3581b82b955c75fe6

  • SHA256

    a6b5e60bfcc893ccc19e5535c27510093851b6bdaa76a86b489d898c3a3004ad

  • SHA512

    6ae81156c1e40a7ca2d49581a0969bd97d29bd08db219bde9690a7092396d97bfe9db5c6e3773fa036af5d30ce811a14eb525208a19c67374f145c7584ddcd89

  • SSDEEP

    1536:N1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:P+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      a6b5e60bfcc893ccc19e5535c27510093851b6bdaa76a86b489d898c3a3004adN

    • Size

      89KB

    • MD5

      ad3bfabe042476fd00c9430dfd293d60

    • SHA1

      a3bd0dbb898bcd82c16190b3581b82b955c75fe6

    • SHA256

      a6b5e60bfcc893ccc19e5535c27510093851b6bdaa76a86b489d898c3a3004ad

    • SHA512

      6ae81156c1e40a7ca2d49581a0969bd97d29bd08db219bde9690a7092396d97bfe9db5c6e3773fa036af5d30ce811a14eb525208a19c67374f145c7584ddcd89

    • SSDEEP

      1536:N1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:P+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks