General

  • Target

    a2951a638042420c96dbfa17ed61e8d3

  • Size

    89KB

  • Sample

    240224-ybbfqsdd71

  • MD5

    a2951a638042420c96dbfa17ed61e8d3

  • SHA1

    c8ffee92dc7ed069bf36acfbc1d25c8366de2984

  • SHA256

    bba79a727693bfdd9f09acd42a1de97618e5c7507f440505a90e5944b3b738b9

  • SHA512

    a86cf9e8794821cc60b55dbd1022e8ac8e2a15febc7a3d183c50e994ebacc156b5c48b44d58741b3970c1ccbefad2c93388507f4c66d0c1592ba85ed7a899ecc

  • SSDEEP

    1536:QL+mFM2HXKZgiwIksu+XM5/HtAQ9JB9p03:i+4MOIkLZJNAQ9JBjq

Malware Config

Targets

    • Target

      a2951a638042420c96dbfa17ed61e8d3

    • Size

      89KB

    • MD5

      a2951a638042420c96dbfa17ed61e8d3

    • SHA1

      c8ffee92dc7ed069bf36acfbc1d25c8366de2984

    • SHA256

      bba79a727693bfdd9f09acd42a1de97618e5c7507f440505a90e5944b3b738b9

    • SHA512

      a86cf9e8794821cc60b55dbd1022e8ac8e2a15febc7a3d183c50e994ebacc156b5c48b44d58741b3970c1ccbefad2c93388507f4c66d0c1592ba85ed7a899ecc

    • SSDEEP

      1536:QL+mFM2HXKZgiwIksu+XM5/HtAQ9JB9p03:i+4MOIkLZJNAQ9JBjq

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks