General

  • Target

    46c9ab6ba9c5df30f8aa54681566166e18adbd107a0e9f005f148bca82227075

  • Size

    89KB

  • Sample

    241121-3fm3jswrhl

  • MD5

    684ef54a4ceb4fd1081f2fe37cc00487

  • SHA1

    24ce2a03897e113fee8a142f1b8ed5691912030e

  • SHA256

    46c9ab6ba9c5df30f8aa54681566166e18adbd107a0e9f005f148bca82227075

  • SHA512

    75cce0c467ac421093352f89c343fd3683ef77e143e9c3b362b4c8948094d996c9f5ab7a23b09c9a3b7582107ed8f7e91b1642d423bd95213bb788568f989a53

  • SSDEEP

    1536:81+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:I+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      46c9ab6ba9c5df30f8aa54681566166e18adbd107a0e9f005f148bca82227075

    • Size

      89KB

    • MD5

      684ef54a4ceb4fd1081f2fe37cc00487

    • SHA1

      24ce2a03897e113fee8a142f1b8ed5691912030e

    • SHA256

      46c9ab6ba9c5df30f8aa54681566166e18adbd107a0e9f005f148bca82227075

    • SHA512

      75cce0c467ac421093352f89c343fd3683ef77e143e9c3b362b4c8948094d996c9f5ab7a23b09c9a3b7582107ed8f7e91b1642d423bd95213bb788568f989a53

    • SSDEEP

      1536:81+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:I+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks