General

  • Target

    73ba8f418bd699351d43c3600b4558fb2f604f4c7c1819f295fcac37894fc417

  • Size

    110KB

  • Sample

    241222-3qw37ssjav

  • MD5

    6f81f29cea5718b5bbff55649d87b1a4

  • SHA1

    c23cf9126f5149ac176f5558e26eb0b30e353fa5

  • SHA256

    73ba8f418bd699351d43c3600b4558fb2f604f4c7c1819f295fcac37894fc417

  • SHA512

    21a9081ac02011db56f423fa30fd5798daa637dbcd5a651203c8989815583a7a37a7dd4401f1383a754bf86e1b5fc13ac34bedf901a0befcf61da8c775072128

  • SSDEEP

    1536:liLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:liyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      73ba8f418bd699351d43c3600b4558fb2f604f4c7c1819f295fcac37894fc417

    • Size

      110KB

    • MD5

      6f81f29cea5718b5bbff55649d87b1a4

    • SHA1

      c23cf9126f5149ac176f5558e26eb0b30e353fa5

    • SHA256

      73ba8f418bd699351d43c3600b4558fb2f604f4c7c1819f295fcac37894fc417

    • SHA512

      21a9081ac02011db56f423fa30fd5798daa637dbcd5a651203c8989815583a7a37a7dd4401f1383a754bf86e1b5fc13ac34bedf901a0befcf61da8c775072128

    • SSDEEP

      1536:liLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:liyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks