General

  • Target

    1edc9bae19fb310e91a31ff2041b76bd87510ab143735dea2dbc46b99d8d91b9

  • Size

    49KB

  • Sample

    241122-zcw99svjep

  • MD5

    259b31e1afca441b18362bb55be27ed7

  • SHA1

    b8c1dae59920ca493afeb58e0ce86eb821d30eb4

  • SHA256

    1edc9bae19fb310e91a31ff2041b76bd87510ab143735dea2dbc46b99d8d91b9

  • SHA512

    1a156998035550c4abe1fa78c57f2591116dea6b5b04626eb5f43ae4c4b49c3516d7ac0cb8c7ef9e13dda832a6b5e31e0cbe17177575d52919c7ae9914400b04

  • SSDEEP

    1536:zOBLXNqgzf2v6b6NkXklZlogHGe9eBXWV:zYLduv6OqXIlogmjWV

Malware Config

Targets

    • Target

      1edc9bae19fb310e91a31ff2041b76bd87510ab143735dea2dbc46b99d8d91b9

    • Size

      49KB

    • MD5

      259b31e1afca441b18362bb55be27ed7

    • SHA1

      b8c1dae59920ca493afeb58e0ce86eb821d30eb4

    • SHA256

      1edc9bae19fb310e91a31ff2041b76bd87510ab143735dea2dbc46b99d8d91b9

    • SHA512

      1a156998035550c4abe1fa78c57f2591116dea6b5b04626eb5f43ae4c4b49c3516d7ac0cb8c7ef9e13dda832a6b5e31e0cbe17177575d52919c7ae9914400b04

    • SSDEEP

      1536:zOBLXNqgzf2v6b6NkXklZlogHGe9eBXWV:zYLduv6OqXIlogmjWV

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks