General

  • Target

    6b56a7883ca51b5a8f72d68beecfb904

  • Size

    46KB

  • Sample

    231219-v5czwagfa9

  • MD5

    6b56a7883ca51b5a8f72d68beecfb904

  • SHA1

    aefc375e327f868201b5887fbb5787df5a284f73

  • SHA256

    4817886dbbb01617d2268b7d72f1c392e074e12cfb017b0997d1e11b3e8471ac

  • SHA512

    864f6c202f90f3b9d4f02c940ebb80eb7e832d306ae525568ea599a20028b377d6dd657c0722a1105abb92600f71e0432f82f7d726ce0ff59d3854ddf966baab

  • SSDEEP

    768:OtwyMe0Jy8xwd117mrlI9m/xGuv4V7RMEnqt9jn2ACH3hLZ2HwCLlH:Otwyedxwr1qUMv4VV6j2A83hVY

Malware Config

Targets

    • Target

      6b56a7883ca51b5a8f72d68beecfb904

    • Size

      46KB

    • MD5

      6b56a7883ca51b5a8f72d68beecfb904

    • SHA1

      aefc375e327f868201b5887fbb5787df5a284f73

    • SHA256

      4817886dbbb01617d2268b7d72f1c392e074e12cfb017b0997d1e11b3e8471ac

    • SHA512

      864f6c202f90f3b9d4f02c940ebb80eb7e832d306ae525568ea599a20028b377d6dd657c0722a1105abb92600f71e0432f82f7d726ce0ff59d3854ddf966baab

    • SSDEEP

      768:OtwyMe0Jy8xwd117mrlI9m/xGuv4V7RMEnqt9jn2ACH3hLZ2HwCLlH:Otwyedxwr1qUMv4VV6j2A83hVY

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks