General

  • Target

    7010b3e43872b1663ad147f3a699763c2677add86aea5eeb60f927804f402427N.exe

  • Size

    89KB

  • Sample

    241120-gltxdstanj

  • MD5

    6ff10dad65e5935e08dd1cb4fc0dc7d0

  • SHA1

    d7b05d194abd8c67c549d87ee518775150322bb6

  • SHA256

    7010b3e43872b1663ad147f3a699763c2677add86aea5eeb60f927804f402427

  • SHA512

    f46fe534fb4c176558080f48ebb1fcae054b49ed5ec5eb040ac8472bd1fd8c335025ff88f8162dd3eb1d66997511f9de1b48ed480d84a5d151b6e1e3d3e1ab52

  • SSDEEP

    1536:+1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:++4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      7010b3e43872b1663ad147f3a699763c2677add86aea5eeb60f927804f402427N.exe

    • Size

      89KB

    • MD5

      6ff10dad65e5935e08dd1cb4fc0dc7d0

    • SHA1

      d7b05d194abd8c67c549d87ee518775150322bb6

    • SHA256

      7010b3e43872b1663ad147f3a699763c2677add86aea5eeb60f927804f402427

    • SHA512

      f46fe534fb4c176558080f48ebb1fcae054b49ed5ec5eb040ac8472bd1fd8c335025ff88f8162dd3eb1d66997511f9de1b48ed480d84a5d151b6e1e3d3e1ab52

    • SSDEEP

      1536:+1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:++4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks