General

  • Target

    1986d1c97fe2b236bac420b7bd3ac679bdc7d145db9b4c04cba3dd2724d19ea6.exe

  • Size

    110KB

  • Sample

    241205-1lmymazlgn

  • MD5

    96152f54bc2fbc1a53583d4595e5fd62

  • SHA1

    b641ffa87cb99428710358babe7b13bfccae65ec

  • SHA256

    1986d1c97fe2b236bac420b7bd3ac679bdc7d145db9b4c04cba3dd2724d19ea6

  • SHA512

    b5dd1a10e93d5df1c848a35d6a1297078411ced10c5085c3c9505cada548a327a2f82ac30994b09a46f4b46e9f3d41f3fd74626a35cf7f2117b9b3bfc281cb42

  • SSDEEP

    1536:tiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:tiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      1986d1c97fe2b236bac420b7bd3ac679bdc7d145db9b4c04cba3dd2724d19ea6.exe

    • Size

      110KB

    • MD5

      96152f54bc2fbc1a53583d4595e5fd62

    • SHA1

      b641ffa87cb99428710358babe7b13bfccae65ec

    • SHA256

      1986d1c97fe2b236bac420b7bd3ac679bdc7d145db9b4c04cba3dd2724d19ea6

    • SHA512

      b5dd1a10e93d5df1c848a35d6a1297078411ced10c5085c3c9505cada548a327a2f82ac30994b09a46f4b46e9f3d41f3fd74626a35cf7f2117b9b3bfc281cb42

    • SSDEEP

      1536:tiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:tiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks