General

  • Target

    5b1d02e67e0126a16f253d9e8b042ead444aa0951f515063075e43db677dc5e9N

  • Size

    110KB

  • Sample

    250113-n3deastldl

  • MD5

    e9c1aff2af6da28c1afcdbadc9665140

  • SHA1

    32debe07ba800de7eabe6f77f3f9c6df91755689

  • SHA256

    5b1d02e67e0126a16f253d9e8b042ead444aa0951f515063075e43db677dc5e9

  • SHA512

    f2aedca5da5f83e27f6a9441a77cb9efca6271ed2dc6bc207a4fc2b40a53a09de4583c075bb39cdda9f4bc6fcb9d962d3361732d00bc2fa7c222ae9d82ca8e61

  • SSDEEP

    1536:2iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:2iyvRmDLs/ZrwWJjAqGcRJ2hw

Malware Config

Targets

    • Target

      5b1d02e67e0126a16f253d9e8b042ead444aa0951f515063075e43db677dc5e9N

    • Size

      110KB

    • MD5

      e9c1aff2af6da28c1afcdbadc9665140

    • SHA1

      32debe07ba800de7eabe6f77f3f9c6df91755689

    • SHA256

      5b1d02e67e0126a16f253d9e8b042ead444aa0951f515063075e43db677dc5e9

    • SHA512

      f2aedca5da5f83e27f6a9441a77cb9efca6271ed2dc6bc207a4fc2b40a53a09de4583c075bb39cdda9f4bc6fcb9d962d3361732d00bc2fa7c222ae9d82ca8e61

    • SSDEEP

      1536:2iLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Ew:2iyvRmDLs/ZrwWJjAqGcRJ2hw

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks