General

  • Target

    5991ad27b5575c625d9ee1b6439f464a05780adc0032c80140658ae73693edf4.exe

  • Size

    89KB

  • Sample

    241121-bzsnlaybrl

  • MD5

    308d30e8b0b45c198ec2107d97eedeff

  • SHA1

    dc394a59b50ac780cfed32415bc0da2dc77fae12

  • SHA256

    5991ad27b5575c625d9ee1b6439f464a05780adc0032c80140658ae73693edf4

  • SHA512

    f0c7bdb7a6b392da4c4d02ff845ad4606019087aabe372136bf6159922db47fe702e7784548b9f478e2a5087278cc842a212abfda8e50aac55d69a7de4131a69

  • SSDEEP

    1536:hr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox76:l+4MJIkLZJNAQ9Jo96

Malware Config

Targets

    • Target

      5991ad27b5575c625d9ee1b6439f464a05780adc0032c80140658ae73693edf4.exe

    • Size

      89KB

    • MD5

      308d30e8b0b45c198ec2107d97eedeff

    • SHA1

      dc394a59b50ac780cfed32415bc0da2dc77fae12

    • SHA256

      5991ad27b5575c625d9ee1b6439f464a05780adc0032c80140658ae73693edf4

    • SHA512

      f0c7bdb7a6b392da4c4d02ff845ad4606019087aabe372136bf6159922db47fe702e7784548b9f478e2a5087278cc842a212abfda8e50aac55d69a7de4131a69

    • SSDEEP

      1536:hr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox76:l+4MJIkLZJNAQ9Jo96

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks