General

  • Target

    4ed83478f1cd128443282f0735c777a0c2dae6513e1d9695891f83040f346818

  • Size

    110KB

  • Sample

    250123-ahngwatldn

  • MD5

    96d8f5462c5c83d9443766b80f32a400

  • SHA1

    bb0a195a6aadbc1fbdf6104e2c673c6a7b894289

  • SHA256

    4ed83478f1cd128443282f0735c777a0c2dae6513e1d9695891f83040f346818

  • SHA512

    81ad516ff031b5f95b95144f0ef99c89885c34b3bcd572896d35ae1ea9c3debaf621eec1e504d0a38b02b06f94f36f613a014e31a90ab75fd3c47c6ef88bc0df

  • SSDEEP

    1536:JiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:JiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      4ed83478f1cd128443282f0735c777a0c2dae6513e1d9695891f83040f346818

    • Size

      110KB

    • MD5

      96d8f5462c5c83d9443766b80f32a400

    • SHA1

      bb0a195a6aadbc1fbdf6104e2c673c6a7b894289

    • SHA256

      4ed83478f1cd128443282f0735c777a0c2dae6513e1d9695891f83040f346818

    • SHA512

      81ad516ff031b5f95b95144f0ef99c89885c34b3bcd572896d35ae1ea9c3debaf621eec1e504d0a38b02b06f94f36f613a014e31a90ab75fd3c47c6ef88bc0df

    • SSDEEP

      1536:JiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:JiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks