General

  • Target

    70005fd5cadfbadc32e3953ef063837742928a63760aa9ef5e1b8716ebba6804

  • Size

    49KB

  • Sample

    250208-by4dpsxrhs

  • MD5

    9b831b37b23e9575ed171136b5dbcd46

  • SHA1

    bc4ea9dcc31f1d8c6455a9d0c9a6f5bbaabb411b

  • SHA256

    70005fd5cadfbadc32e3953ef063837742928a63760aa9ef5e1b8716ebba6804

  • SHA512

    4792a0c260adcfa0725736c1625d9e371936693f93eba8db13c08bb7969a7efe9c0a7263d4131a2d60eb365f6d2820b498f515c48e94b68ef4ff9385a1f3d586

  • SSDEEP

    1536:YOBLXNqgzf2v6b6NkXklZlogHGe9eBXW:YYLduv6OqXIlogmjW

Malware Config

Targets

    • Target

      70005fd5cadfbadc32e3953ef063837742928a63760aa9ef5e1b8716ebba6804

    • Size

      49KB

    • MD5

      9b831b37b23e9575ed171136b5dbcd46

    • SHA1

      bc4ea9dcc31f1d8c6455a9d0c9a6f5bbaabb411b

    • SHA256

      70005fd5cadfbadc32e3953ef063837742928a63760aa9ef5e1b8716ebba6804

    • SHA512

      4792a0c260adcfa0725736c1625d9e371936693f93eba8db13c08bb7969a7efe9c0a7263d4131a2d60eb365f6d2820b498f515c48e94b68ef4ff9385a1f3d586

    • SSDEEP

      1536:YOBLXNqgzf2v6b6NkXklZlogHGe9eBXW:YYLduv6OqXIlogmjW

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks