General

  • Target

    77210ac8af5ad4d73e544ad5c019d37f

  • Size

    160KB

  • Sample

    231219-w3e7wsdchm

  • MD5

    77210ac8af5ad4d73e544ad5c019d37f

  • SHA1

    50c276004a936432a4d08f13e39c274e949408cf

  • SHA256

    70e5336297aefe2a4c87d255f832f7e95cc47afb7768d086dcaa421803a4e77c

  • SHA512

    38b770cc63174a850e86a717a11e78a9de658a15a83591c5eda8d0ad22760daa4317664f36b051fc34249debdd8ab0725c5c5b0f4ec92efbf423ca7d59469ca4

  • SSDEEP

    1536:YEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:bY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      77210ac8af5ad4d73e544ad5c019d37f

    • Size

      160KB

    • MD5

      77210ac8af5ad4d73e544ad5c019d37f

    • SHA1

      50c276004a936432a4d08f13e39c274e949408cf

    • SHA256

      70e5336297aefe2a4c87d255f832f7e95cc47afb7768d086dcaa421803a4e77c

    • SHA512

      38b770cc63174a850e86a717a11e78a9de658a15a83591c5eda8d0ad22760daa4317664f36b051fc34249debdd8ab0725c5c5b0f4ec92efbf423ca7d59469ca4

    • SSDEEP

      1536:YEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:bY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks