General

  • Target

    8a25fb612c0458bee88addc578feb4e51a71047132ed8fc481a2ad56bead9bbd.exe

  • Size

    160KB

  • Sample

    241123-gbb9lazjhx

  • MD5

    2061a159a71b484e5628980795aede6f

  • SHA1

    2bd6c76516d4ba28f2b143eaac45ab954135190e

  • SHA256

    8a25fb612c0458bee88addc578feb4e51a71047132ed8fc481a2ad56bead9bbd

  • SHA512

    56fa8b9e186824b8ae7ae5da5aec12c395614a99d65b05f8e546ff81fb8f552f064b3efcff5de0d1788e501422c4092ec7bf0f59c5ff03c0eb0907c0892549b7

  • SSDEEP

    1536:bEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:IY+4MiIkLZJNAQ9J6v+

Malware Config

Targets

    • Target

      8a25fb612c0458bee88addc578feb4e51a71047132ed8fc481a2ad56bead9bbd.exe

    • Size

      160KB

    • MD5

      2061a159a71b484e5628980795aede6f

    • SHA1

      2bd6c76516d4ba28f2b143eaac45ab954135190e

    • SHA256

      8a25fb612c0458bee88addc578feb4e51a71047132ed8fc481a2ad56bead9bbd

    • SHA512

      56fa8b9e186824b8ae7ae5da5aec12c395614a99d65b05f8e546ff81fb8f552f064b3efcff5de0d1788e501422c4092ec7bf0f59c5ff03c0eb0907c0892549b7

    • SSDEEP

      1536:bEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xphM:IY+4MiIkLZJNAQ9J6v+

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks