General

  • Target

    de79b129ccffbaf637ce7af93feba7c748d13997f997e1977b244ab04a075a76

  • Size

    89KB

  • Sample

    241210-b26cgaypcy

  • MD5

    ac5a7993402082d01fd8b06e43930519

  • SHA1

    88c4bdbfaedd4032da912caef6f3ea0035382518

  • SHA256

    de79b129ccffbaf637ce7af93feba7c748d13997f997e1977b244ab04a075a76

  • SHA512

    47c9bad8403672040f23e7919f24fe1fd1d39e1f90c59de28d01c773e23feb753100cfebdc58002ce8aef3d267c0ed2e23f4a545f2242bfb6664fb222c9df676

  • SSDEEP

    1536:N1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7u:P+4MJIkLZJNAQ9Jo9u

Malware Config

Targets

    • Target

      de79b129ccffbaf637ce7af93feba7c748d13997f997e1977b244ab04a075a76

    • Size

      89KB

    • MD5

      ac5a7993402082d01fd8b06e43930519

    • SHA1

      88c4bdbfaedd4032da912caef6f3ea0035382518

    • SHA256

      de79b129ccffbaf637ce7af93feba7c748d13997f997e1977b244ab04a075a76

    • SHA512

      47c9bad8403672040f23e7919f24fe1fd1d39e1f90c59de28d01c773e23feb753100cfebdc58002ce8aef3d267c0ed2e23f4a545f2242bfb6664fb222c9df676

    • SSDEEP

      1536:N1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7u:P+4MJIkLZJNAQ9Jo9u

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks