General

  • Target

    98b00df39b7f7a7cfda8a02e50dd4d04e1cdd8edfabd111b0d38047d8fbbf15c.exe

  • Size

    34KB

  • Sample

    241122-l4hz3aymb1

  • MD5

    15b30697d4380334a2e1c9533c015bd5

  • SHA1

    56068fad7da3763ecc847141d35a85227bb94854

  • SHA256

    98b00df39b7f7a7cfda8a02e50dd4d04e1cdd8edfabd111b0d38047d8fbbf15c

  • SHA512

    13e21ac8483b20f7d5f846e310188263be685e9e664662e996a5a5daf4c699833786aedb847c7e3a8bd008b5eb229da15fd9f7956f791f870c8f2335a3746cab

  • SSDEEP

    768:Qp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Ji:QpYoX58z1uirL98xMWnT0OQ9Ji

Malware Config

Targets

    • Target

      98b00df39b7f7a7cfda8a02e50dd4d04e1cdd8edfabd111b0d38047d8fbbf15c.exe

    • Size

      34KB

    • MD5

      15b30697d4380334a2e1c9533c015bd5

    • SHA1

      56068fad7da3763ecc847141d35a85227bb94854

    • SHA256

      98b00df39b7f7a7cfda8a02e50dd4d04e1cdd8edfabd111b0d38047d8fbbf15c

    • SHA512

      13e21ac8483b20f7d5f846e310188263be685e9e664662e996a5a5daf4c699833786aedb847c7e3a8bd008b5eb229da15fd9f7956f791f870c8f2335a3746cab

    • SSDEEP

      768:Qp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9Ji:QpYoX58z1uirL98xMWnT0OQ9Ji

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks