General

  • Target

    3ffbbab42ac99dae042cd852858fffc9f2a7224b6324175ccff3e87dc17aa4fd

  • Size

    110KB

  • Sample

    250220-2p3nxswrdz

  • MD5

    3db89573b8a236edf3151a8984ba96d6

  • SHA1

    511e60ecbfe344b31382d96a1b0433df7e68a4d6

  • SHA256

    3ffbbab42ac99dae042cd852858fffc9f2a7224b6324175ccff3e87dc17aa4fd

  • SHA512

    d6099313863f517d1f5abeda32357e436f265b2922e3a84458265d57c72c9b9ba6a67bf6f6dd02d8614e1d58dc6996d99126696abd5404e4cc778e467ca784e0

  • SSDEEP

    1536:EiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:EiyvRmDLs/ZrwWJjAqGcRJ2hA

Malware Config

Targets

    • Target

      3ffbbab42ac99dae042cd852858fffc9f2a7224b6324175ccff3e87dc17aa4fd

    • Size

      110KB

    • MD5

      3db89573b8a236edf3151a8984ba96d6

    • SHA1

      511e60ecbfe344b31382d96a1b0433df7e68a4d6

    • SHA256

      3ffbbab42ac99dae042cd852858fffc9f2a7224b6324175ccff3e87dc17aa4fd

    • SHA512

      d6099313863f517d1f5abeda32357e436f265b2922e3a84458265d57c72c9b9ba6a67bf6f6dd02d8614e1d58dc6996d99126696abd5404e4cc778e467ca784e0

    • SSDEEP

      1536:EiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0EA:EiyvRmDLs/ZrwWJjAqGcRJ2hA

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks