General

  • Target

    80426c6b8d187ee654a76aed1cadb77c911d152a416bbcbd15c3ff5683e0c8e7N

  • Size

    110KB

  • Sample

    250112-zzwl9asjap

  • MD5

    0e4abd5720b3abea9657040212156330

  • SHA1

    db1cf067f5099c2a3c98db5c7eb789d969facc5d

  • SHA256

    80426c6b8d187ee654a76aed1cadb77c911d152a416bbcbd15c3ff5683e0c8e7

  • SHA512

    781ca0d757aee3cbaa659913ff13e2ce908de8b89c6689f5d241de8ccd8f805034f7eaa335f9300490f7cec3c56094f2816c4bdedffa599ceb37b85728b129f7

  • SSDEEP

    1536:GiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:GiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      80426c6b8d187ee654a76aed1cadb77c911d152a416bbcbd15c3ff5683e0c8e7N

    • Size

      110KB

    • MD5

      0e4abd5720b3abea9657040212156330

    • SHA1

      db1cf067f5099c2a3c98db5c7eb789d969facc5d

    • SHA256

      80426c6b8d187ee654a76aed1cadb77c911d152a416bbcbd15c3ff5683e0c8e7

    • SHA512

      781ca0d757aee3cbaa659913ff13e2ce908de8b89c6689f5d241de8ccd8f805034f7eaa335f9300490f7cec3c56094f2816c4bdedffa599ceb37b85728b129f7

    • SSDEEP

      1536:GiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:GiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks