General

  • Target

    8aae04b8e28612d761b2d1b64df597c5

  • Size

    160KB

  • Sample

    231219-yparcsgehk

  • MD5

    8aae04b8e28612d761b2d1b64df597c5

  • SHA1

    6a35b1a7c190db677423905f8c9ec11d531a521a

  • SHA256

    305a7498e381c3f369cac7547f09c01d34b7fd61155eb29985b1851dca67a396

  • SHA512

    e1110d47ba7d5d5b24b37dfb994689544b5bdf8e6b506ca4ea672f0c68a417a99a0d5fecc5f885a889695d1bf0669636f7e946cb4e8814e00c90128d9eae3cc0

  • SSDEEP

    1536:YEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:bY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      8aae04b8e28612d761b2d1b64df597c5

    • Size

      160KB

    • MD5

      8aae04b8e28612d761b2d1b64df597c5

    • SHA1

      6a35b1a7c190db677423905f8c9ec11d531a521a

    • SHA256

      305a7498e381c3f369cac7547f09c01d34b7fd61155eb29985b1851dca67a396

    • SHA512

      e1110d47ba7d5d5b24b37dfb994689544b5bdf8e6b506ca4ea672f0c68a417a99a0d5fecc5f885a889695d1bf0669636f7e946cb4e8814e00c90128d9eae3cc0

    • SSDEEP

      1536:YEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:bY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks