General

  • Target

    9da040c8ab1afbcec53fc9210e82da11a7eb176f969602ea7fd3b9acbc444f7e

  • Size

    45KB

  • Sample

    241220-ywph4asqhw

  • MD5

    35119ed1366029c6e592e1d8fc4365ee

  • SHA1

    100b9662a33714f00956119870add4c8e2b689bd

  • SHA256

    9da040c8ab1afbcec53fc9210e82da11a7eb176f969602ea7fd3b9acbc444f7e

  • SHA512

    fe5510f70e89c91d6c9f2ad277bbcadcf728049445ab9e87922dbc1cb6c5b2bac6b628bdc9f0acb16a0c7f66d703148a0be954a73d26bd4ed0804d31b2d8fe6e

  • SSDEEP

    768:XhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2X:xsWE9N5dFu53dsniQaB/xZ14n7zIF+qD

Malware Config

Targets

    • Target

      9da040c8ab1afbcec53fc9210e82da11a7eb176f969602ea7fd3b9acbc444f7e

    • Size

      45KB

    • MD5

      35119ed1366029c6e592e1d8fc4365ee

    • SHA1

      100b9662a33714f00956119870add4c8e2b689bd

    • SHA256

      9da040c8ab1afbcec53fc9210e82da11a7eb176f969602ea7fd3b9acbc444f7e

    • SHA512

      fe5510f70e89c91d6c9f2ad277bbcadcf728049445ab9e87922dbc1cb6c5b2bac6b628bdc9f0acb16a0c7f66d703148a0be954a73d26bd4ed0804d31b2d8fe6e

    • SSDEEP

      768:XhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2X:xsWE9N5dFu53dsniQaB/xZ14n7zIF+qD

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks