General

  • Target

    698619909e1680e82e06711c6d5cf6abce22fddbd50ac11f34dc732039afedbc

  • Size

    160KB

  • Sample

    250204-3r4vfayldv

  • MD5

    03b035178568e3133d9fd17efb10d790

  • SHA1

    5f48355f4b04a8d76b39a83ac4a78b362e20190f

  • SHA256

    698619909e1680e82e06711c6d5cf6abce22fddbd50ac11f34dc732039afedbc

  • SHA512

    7f3cf86e6cb43d0d5af279f848c208cbf9161fbaea16e2cda1b3f85cbd95bc818c92c6abb7b44e45771b16c13006dd9fc739b73aa7e81f621050195b2ed626bb

  • SSDEEP

    1536:tEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:GY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      698619909e1680e82e06711c6d5cf6abce22fddbd50ac11f34dc732039afedbc

    • Size

      160KB

    • MD5

      03b035178568e3133d9fd17efb10d790

    • SHA1

      5f48355f4b04a8d76b39a83ac4a78b362e20190f

    • SHA256

      698619909e1680e82e06711c6d5cf6abce22fddbd50ac11f34dc732039afedbc

    • SHA512

      7f3cf86e6cb43d0d5af279f848c208cbf9161fbaea16e2cda1b3f85cbd95bc818c92c6abb7b44e45771b16c13006dd9fc739b73aa7e81f621050195b2ed626bb

    • SSDEEP

      1536:tEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:GY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks