General

  • Target

    da51a45e1576fcbc2dbd2a62b1eff7effc4f54576f9a07bba5c3dc14bcadacc9

  • Size

    110KB

  • Sample

    241130-e6hczssncx

  • MD5

    3745db67d5eeb65e4a512df92dbe48dd

  • SHA1

    130b7e29d26a7fe8ba6655f3cf011b2e85b5db23

  • SHA256

    da51a45e1576fcbc2dbd2a62b1eff7effc4f54576f9a07bba5c3dc14bcadacc9

  • SHA512

    35cd027e185a172e5d975e0a37810062aa436ce7be3171cbca0f4fde43af2d83727f014c81283ac1648ff51be1335416c957767068fc7f1181dae24e4dd45850

  • SSDEEP

    1536:uiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:uiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      da51a45e1576fcbc2dbd2a62b1eff7effc4f54576f9a07bba5c3dc14bcadacc9

    • Size

      110KB

    • MD5

      3745db67d5eeb65e4a512df92dbe48dd

    • SHA1

      130b7e29d26a7fe8ba6655f3cf011b2e85b5db23

    • SHA256

      da51a45e1576fcbc2dbd2a62b1eff7effc4f54576f9a07bba5c3dc14bcadacc9

    • SHA512

      35cd027e185a172e5d975e0a37810062aa436ce7be3171cbca0f4fde43af2d83727f014c81283ac1648ff51be1335416c957767068fc7f1181dae24e4dd45850

    • SSDEEP

      1536:uiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:uiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks