General

  • Target

    683d1232d6125afe78fe1d26fd4a650519470bc47703f0396441561ca166692c.exe

  • Size

    160KB

  • Sample

    241121-bvma1sxbpf

  • MD5

    c06fd20f0cb95403091347f94b703969

  • SHA1

    dc33e0b3fc26011d0a767bcb786dbc21b5da241e

  • SHA256

    683d1232d6125afe78fe1d26fd4a650519470bc47703f0396441561ca166692c

  • SHA512

    09bfa634d212647664ac81efd8d4d9c98b358ad13caf83873bc8a81071072556109e5d484bcb47dca65b0918f3758969285776768ed3f5ef611ff1ec0ff0b23e

  • SSDEEP

    1536:EEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:3Y+4MiIkLZJNAQ9J6vO

Malware Config

Targets

    • Target

      683d1232d6125afe78fe1d26fd4a650519470bc47703f0396441561ca166692c.exe

    • Size

      160KB

    • MD5

      c06fd20f0cb95403091347f94b703969

    • SHA1

      dc33e0b3fc26011d0a767bcb786dbc21b5da241e

    • SHA256

      683d1232d6125afe78fe1d26fd4a650519470bc47703f0396441561ca166692c

    • SHA512

      09bfa634d212647664ac81efd8d4d9c98b358ad13caf83873bc8a81071072556109e5d484bcb47dca65b0918f3758969285776768ed3f5ef611ff1ec0ff0b23e

    • SSDEEP

      1536:EEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:3Y+4MiIkLZJNAQ9J6vO

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks