General

  • Target

    42dfd9e42b1356e8309edb5c0b19178c7f148d3b7fc4509730702e11388a4627

  • Size

    45KB

  • Sample

    241208-16wfhazmfl

  • MD5

    2133a94a372ded121e60f50f4ddbfb4f

  • SHA1

    5523b717d744ab1472de018b63aa72a065a50647

  • SHA256

    42dfd9e42b1356e8309edb5c0b19178c7f148d3b7fc4509730702e11388a4627

  • SHA512

    7e29fa3f8dc2c50a2cf9b2743f39b40bd3c378f346bdbf3fc910dff35f52fe1e1179f710c2bc99e151e92d991dae5b787703496d2fb010bfdce5dbaffeeabb5f

  • SSDEEP

    768:+hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2V:SsWE9N5dFu53dsniQaB/xZ14n7zIF+q5

Malware Config

Targets

    • Target

      42dfd9e42b1356e8309edb5c0b19178c7f148d3b7fc4509730702e11388a4627

    • Size

      45KB

    • MD5

      2133a94a372ded121e60f50f4ddbfb4f

    • SHA1

      5523b717d744ab1472de018b63aa72a065a50647

    • SHA256

      42dfd9e42b1356e8309edb5c0b19178c7f148d3b7fc4509730702e11388a4627

    • SHA512

      7e29fa3f8dc2c50a2cf9b2743f39b40bd3c378f346bdbf3fc910dff35f52fe1e1179f710c2bc99e151e92d991dae5b787703496d2fb010bfdce5dbaffeeabb5f

    • SSDEEP

      768:+hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2V:SsWE9N5dFu53dsniQaB/xZ14n7zIF+q5

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks