General

  • Target

    9b8e5386e6a52c1cddfa2f1b9c78a418f8e3de4bb742d2778544e53cb6836686

  • Size

    110KB

  • Sample

    250111-edsm9avnep

  • MD5

    24e5df391a6a6774fffced3172d49410

  • SHA1

    b530c78e5f1495f6b730003fa463b49e5539f351

  • SHA256

    9b8e5386e6a52c1cddfa2f1b9c78a418f8e3de4bb742d2778544e53cb6836686

  • SHA512

    b8d2b7d7454ef3d89b74c9bb8acf5e1bad0b6dae1fc881c7e04195d9b1c7a3531ff80140f17146b89157c1b355533228dad88354b0f878e3cf90585479b230f9

  • SSDEEP

    1536:YiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:YiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      9b8e5386e6a52c1cddfa2f1b9c78a418f8e3de4bb742d2778544e53cb6836686

    • Size

      110KB

    • MD5

      24e5df391a6a6774fffced3172d49410

    • SHA1

      b530c78e5f1495f6b730003fa463b49e5539f351

    • SHA256

      9b8e5386e6a52c1cddfa2f1b9c78a418f8e3de4bb742d2778544e53cb6836686

    • SHA512

      b8d2b7d7454ef3d89b74c9bb8acf5e1bad0b6dae1fc881c7e04195d9b1c7a3531ff80140f17146b89157c1b355533228dad88354b0f878e3cf90585479b230f9

    • SSDEEP

      1536:YiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:YiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks