General

  • Target

    89a2d9419278586f92465ade8e5f6eee

  • Size

    160KB

  • Sample

    231219-ykngnafhhn

  • MD5

    89a2d9419278586f92465ade8e5f6eee

  • SHA1

    5d04f57a0c24c83336dd4192e17f0cb8786c1e61

  • SHA256

    03d368d9b48cfde5da053d1c07c07cfe6438a341ff93bbd40cae5d3e6e791b09

  • SHA512

    8ec737550a0c3f968abcd27d16ed6f3765aadeecf90a3928b085a29bd57fc9895fe0884c2b78dcd8dc46565ceb54694c61f31904a90c378f445a40cc1389406e

  • SSDEEP

    1536:REY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:aY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      89a2d9419278586f92465ade8e5f6eee

    • Size

      160KB

    • MD5

      89a2d9419278586f92465ade8e5f6eee

    • SHA1

      5d04f57a0c24c83336dd4192e17f0cb8786c1e61

    • SHA256

      03d368d9b48cfde5da053d1c07c07cfe6438a341ff93bbd40cae5d3e6e791b09

    • SHA512

      8ec737550a0c3f968abcd27d16ed6f3765aadeecf90a3928b085a29bd57fc9895fe0884c2b78dcd8dc46565ceb54694c61f31904a90c378f445a40cc1389406e

    • SSDEEP

      1536:REY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:aY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks