General

  • Target

    0be271fb54410507e2bd0d36baadd87587bd28ebb66edb50eb994f8b39f999bf.exe

  • Size

    89KB

  • Sample

    241123-egt1gsxpex

  • MD5

    6421c6e634b72e291523a41d900d44fb

  • SHA1

    8e509ccd6a9b9bdbd2a18e933dab026b9f6fb030

  • SHA256

    0be271fb54410507e2bd0d36baadd87587bd28ebb66edb50eb994f8b39f999bf

  • SHA512

    28c453fb03c1beaa1d1c2eef10028d735075f875d634b9e02e78293cb873542fca9b9c9d9d149107db66eccb331c86711a3347f33126034545f9c4d8f306785e

  • SSDEEP

    1536:4r+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:q+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      0be271fb54410507e2bd0d36baadd87587bd28ebb66edb50eb994f8b39f999bf.exe

    • Size

      89KB

    • MD5

      6421c6e634b72e291523a41d900d44fb

    • SHA1

      8e509ccd6a9b9bdbd2a18e933dab026b9f6fb030

    • SHA256

      0be271fb54410507e2bd0d36baadd87587bd28ebb66edb50eb994f8b39f999bf

    • SHA512

      28c453fb03c1beaa1d1c2eef10028d735075f875d634b9e02e78293cb873542fca9b9c9d9d149107db66eccb331c86711a3347f33126034545f9c4d8f306785e

    • SSDEEP

      1536:4r+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:q+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks