General

  • Target

    10431880001.zip

  • Size

    37KB

  • Sample

    230511-24dcksdc3y

  • MD5

    447e0d931d6b72411c71f908fc884708

  • SHA1

    72226426c5c050a8688bde1041c23a1a7d179eee

  • SHA256

    41c64389813ded5f3fc47734bf34520c5fd62bd919ff0e51975ca45a33b91608

  • SHA512

    44417d9f93c7bdab6117e2d0bc3d9e5fc316cecf50cc7d69da36e6e5cf4b11b8b88cfe468c72dc4c73b17e2f7de56f4635f1d4a27943defd6c697980a80cb1bb

  • SSDEEP

    768:0yUFx5xbLEAZkwx1ZAKRhVRhBvtpdlXqSlsrOBBTUey8fMMSN9krnh4PEy:KxwwkwLWmRjvPdlXqNrOBFVy80MSN9kE

Malware Config

Targets

    • Target

      b95ee828e1b1982dcd8630d8a6ab48363af08bf48ee59064155bf6b66bae865a

    • Size

      91KB

    • MD5

      2cdd0a185a63f5ca2892f0a3ffcf8aa8

    • SHA1

      9df06b2ffca38cddfd4a2c3048396080812924a7

    • SHA256

      b95ee828e1b1982dcd8630d8a6ab48363af08bf48ee59064155bf6b66bae865a

    • SHA512

      9844e9d06716866b348383942053e733c18785cb6cd6eb2da0a6a97e90873d2ab3ba53bd516ad87ff2035bfe82aa722063b357087d8bad73d41b529b5ae5cf3e

    • SSDEEP

      1536:kr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7:m+4MJIkLZJNAQ9Jo9

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks