General

  • Target

    b91eedc0ba078bad00660ca176bb44bae29ee34831ae5aff47e0e2a01912304fN

  • Size

    49KB

  • Sample

    241110-s6t9fazcpl

  • MD5

    90cdffde5a6c8b7d151138e740afd190

  • SHA1

    1a805cf261ec08831a6ecbcc875ea9c296908753

  • SHA256

    b91eedc0ba078bad00660ca176bb44bae29ee34831ae5aff47e0e2a01912304f

  • SHA512

    7206444839c1c1196013715b26d73100c0949d11b888d667e6457d433c3203596d970469ccf751f79ac1eb9b7661836bf82c83ee792f5b450d11b83c72ff34e9

  • SSDEEP

    1536:XOBLXNqgzf2v6b6NkXklZlogHGe9eBXW:XYLduv6OqXIlogmjW

Malware Config

Targets

    • Target

      b91eedc0ba078bad00660ca176bb44bae29ee34831ae5aff47e0e2a01912304fN

    • Size

      49KB

    • MD5

      90cdffde5a6c8b7d151138e740afd190

    • SHA1

      1a805cf261ec08831a6ecbcc875ea9c296908753

    • SHA256

      b91eedc0ba078bad00660ca176bb44bae29ee34831ae5aff47e0e2a01912304f

    • SHA512

      7206444839c1c1196013715b26d73100c0949d11b888d667e6457d433c3203596d970469ccf751f79ac1eb9b7661836bf82c83ee792f5b450d11b83c72ff34e9

    • SSDEEP

      1536:XOBLXNqgzf2v6b6NkXklZlogHGe9eBXW:XYLduv6OqXIlogmjW

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks