General

  • Target

    NEAS.102a63f3d69562922a0f56a1c7361aa0_JC.exe

  • Size

    45KB

  • Sample

    231102-1l4alsga9z

  • MD5

    102a63f3d69562922a0f56a1c7361aa0

  • SHA1

    c60d81776fd739c2569afd3c0e848daa4230c032

  • SHA256

    af7f62daf3a94f233ce52d65544795d8549557dad87426ebd413fad77a650248

  • SHA512

    8f3dc3c01c3bf2ddfb806f06b799ec4992bfde81b0058671d7f7879ee5b864c1cbee2960e92959e2ce525b8f7d4cc567fc29ac5172e38cfc6012768f13065883

  • SSDEEP

    768:ahP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:WsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      NEAS.102a63f3d69562922a0f56a1c7361aa0_JC.exe

    • Size

      45KB

    • MD5

      102a63f3d69562922a0f56a1c7361aa0

    • SHA1

      c60d81776fd739c2569afd3c0e848daa4230c032

    • SHA256

      af7f62daf3a94f233ce52d65544795d8549557dad87426ebd413fad77a650248

    • SHA512

      8f3dc3c01c3bf2ddfb806f06b799ec4992bfde81b0058671d7f7879ee5b864c1cbee2960e92959e2ce525b8f7d4cc567fc29ac5172e38cfc6012768f13065883

    • SSDEEP

      768:ahP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:WsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks