General

  • Target

    1983994455a3fa02b4604a866047bba04ee43f3b9d73e2193664b48de0176efbN

  • Size

    45KB

  • Sample

    241109-kzr7ha1hln

  • MD5

    7783fe66d43251db8936d73eada56db0

  • SHA1

    9b205818acb905266a3f08e4a50ecdbd3fed5c56

  • SHA256

    1983994455a3fa02b4604a866047bba04ee43f3b9d73e2193664b48de0176efb

  • SHA512

    33568d1b5b022a133571571bfbe60230a20a53d76bc7596b35fcd39f29d46884cf536be4e4e15a2f3d1c1576c52ea82c3757d60acbe806907444f9232a5619d3

  • SSDEEP

    768:HhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:BsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      1983994455a3fa02b4604a866047bba04ee43f3b9d73e2193664b48de0176efbN

    • Size

      45KB

    • MD5

      7783fe66d43251db8936d73eada56db0

    • SHA1

      9b205818acb905266a3f08e4a50ecdbd3fed5c56

    • SHA256

      1983994455a3fa02b4604a866047bba04ee43f3b9d73e2193664b48de0176efb

    • SHA512

      33568d1b5b022a133571571bfbe60230a20a53d76bc7596b35fcd39f29d46884cf536be4e4e15a2f3d1c1576c52ea82c3757d60acbe806907444f9232a5619d3

    • SSDEEP

      768:HhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:BsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.