General

  • Target

    08fa58079e7e5af77e6761ac067ac6166e3e94c18d9aa3c190f96fd09c5cd575N

  • Size

    89KB

  • Sample

    241110-l3rktaxpgj

  • MD5

    1f50a4849ab71ec4e87a79ef0b4a9510

  • SHA1

    da3ab9da41511728d925688d3156ae2925ef795e

  • SHA256

    08fa58079e7e5af77e6761ac067ac6166e3e94c18d9aa3c190f96fd09c5cd575

  • SHA512

    665665c86cbd9e7f4f88ab9b44ddda30586d184197be595a7c8e5e9bf66eb66cc80c61d02aa8d175683cba06a51984079f2e04ee4ec7ec1e2db80ac1164e9a29

  • SSDEEP

    1536:H1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:V+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      08fa58079e7e5af77e6761ac067ac6166e3e94c18d9aa3c190f96fd09c5cd575N

    • Size

      89KB

    • MD5

      1f50a4849ab71ec4e87a79ef0b4a9510

    • SHA1

      da3ab9da41511728d925688d3156ae2925ef795e

    • SHA256

      08fa58079e7e5af77e6761ac067ac6166e3e94c18d9aa3c190f96fd09c5cd575

    • SHA512

      665665c86cbd9e7f4f88ab9b44ddda30586d184197be595a7c8e5e9bf66eb66cc80c61d02aa8d175683cba06a51984079f2e04ee4ec7ec1e2db80ac1164e9a29

    • SSDEEP

      1536:H1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:V+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks