General

  • Target

    1820d79cbe5a2448c9697aed04824e9465c476feabbd23a9a09888347d780f32N

  • Size

    89KB

  • Sample

    241109-mca1tasflc

  • MD5

    d57dbbbff398584fa417f755c83fb2a0

  • SHA1

    716fdc9f31356594bea84292e8aede0c73c36ae4

  • SHA256

    1820d79cbe5a2448c9697aed04824e9465c476feabbd23a9a09888347d780f32

  • SHA512

    301946fb0310b00cc628bcc6dbbcdeb356009ae47f228181b91fa96907fa0f393e50110637a0db91a3957b6760b3d3159c51053d36a013918a844b921cb3d658

  • SSDEEP

    1536:K1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:i+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      1820d79cbe5a2448c9697aed04824e9465c476feabbd23a9a09888347d780f32N

    • Size

      89KB

    • MD5

      d57dbbbff398584fa417f755c83fb2a0

    • SHA1

      716fdc9f31356594bea84292e8aede0c73c36ae4

    • SHA256

      1820d79cbe5a2448c9697aed04824e9465c476feabbd23a9a09888347d780f32

    • SHA512

      301946fb0310b00cc628bcc6dbbcdeb356009ae47f228181b91fa96907fa0f393e50110637a0db91a3957b6760b3d3159c51053d36a013918a844b921cb3d658

    • SSDEEP

      1536:K1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:i+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.