General

  • Target

    5214a889ffcd14c9c3fe25a7e1df77212c2d4dc037d7e55e6877c97d93320e58N

  • Size

    89KB

  • Sample

    241110-bctx5svpds

  • MD5

    0a9821387c6a866ce146080e4a1744c0

  • SHA1

    320f868816e00acb0134d52203e50367c53957db

  • SHA256

    5214a889ffcd14c9c3fe25a7e1df77212c2d4dc037d7e55e6877c97d93320e58

  • SHA512

    851c129a589c8dc88a6b9a1112c40e3d085c29bf5b6677b1827772ade89a7e438a1cb5cbac7802af601a085e69be96b61a987bbd482c70653243832236be2e59

  • SSDEEP

    1536:D1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:p+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      5214a889ffcd14c9c3fe25a7e1df77212c2d4dc037d7e55e6877c97d93320e58N

    • Size

      89KB

    • MD5

      0a9821387c6a866ce146080e4a1744c0

    • SHA1

      320f868816e00acb0134d52203e50367c53957db

    • SHA256

      5214a889ffcd14c9c3fe25a7e1df77212c2d4dc037d7e55e6877c97d93320e58

    • SHA512

      851c129a589c8dc88a6b9a1112c40e3d085c29bf5b6677b1827772ade89a7e438a1cb5cbac7802af601a085e69be96b61a987bbd482c70653243832236be2e59

    • SSDEEP

      1536:D1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:p+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks