General

  • Target

    77bdc7240ad91a463dc31306db16bd791ef28106ef147b62cf61c4d40e821661N

  • Size

    89KB

  • Sample

    250113-mggzxs1lgq

  • MD5

    9140107d02be5f292ebcdfa45abd1970

  • SHA1

    f0db91a657444a9d4438af6cd098480b16811fe7

  • SHA256

    77bdc7240ad91a463dc31306db16bd791ef28106ef147b62cf61c4d40e821661

  • SHA512

    2b34f7897337aa210bb62e1f2a633733e634a2fa96ac1817d9d352e5dc87afea4bcac26f69f8501f2aeb0856f18762a37e5044147e93007a0cde614139477278

  • SSDEEP

    1536:J1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7a:D+4MJIkLZJNAQ9Jo9a

Malware Config

Targets

    • Target

      77bdc7240ad91a463dc31306db16bd791ef28106ef147b62cf61c4d40e821661N

    • Size

      89KB

    • MD5

      9140107d02be5f292ebcdfa45abd1970

    • SHA1

      f0db91a657444a9d4438af6cd098480b16811fe7

    • SHA256

      77bdc7240ad91a463dc31306db16bd791ef28106ef147b62cf61c4d40e821661

    • SHA512

      2b34f7897337aa210bb62e1f2a633733e634a2fa96ac1817d9d352e5dc87afea4bcac26f69f8501f2aeb0856f18762a37e5044147e93007a0cde614139477278

    • SSDEEP

      1536:J1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7a:D+4MJIkLZJNAQ9Jo9a

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks