General

  • Target

    2466c65f660283347ce4dd0e5e1be47979a7bd5e7280f790b91a7a6a95361d0b

  • Size

    34KB

  • Sample

    241203-zbxveasphs

  • MD5

    d82f446943a647f7d8bfb36bf8b39454

  • SHA1

    c53eb5baeed40922deb5f67a99b5a84d81ac0954

  • SHA256

    2466c65f660283347ce4dd0e5e1be47979a7bd5e7280f790b91a7a6a95361d0b

  • SHA512

    89e65086bb59e2f5671e16fd56b8f9b06d0b58326732dba8df50f595c7918129f0e4e00fe1d367222d297b62819d19354409ae0d21848ad99999e19d9fbf08c8

  • SSDEEP

    768:hp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:hpYoX58z1uirL98xMWnT0OQ9JS

Malware Config

Targets

    • Target

      2466c65f660283347ce4dd0e5e1be47979a7bd5e7280f790b91a7a6a95361d0b

    • Size

      34KB

    • MD5

      d82f446943a647f7d8bfb36bf8b39454

    • SHA1

      c53eb5baeed40922deb5f67a99b5a84d81ac0954

    • SHA256

      2466c65f660283347ce4dd0e5e1be47979a7bd5e7280f790b91a7a6a95361d0b

    • SHA512

      89e65086bb59e2f5671e16fd56b8f9b06d0b58326732dba8df50f595c7918129f0e4e00fe1d367222d297b62819d19354409ae0d21848ad99999e19d9fbf08c8

    • SSDEEP

      768:hp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JS:hpYoX58z1uirL98xMWnT0OQ9JS

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks