General

  • Target

    8bb921e164ccea49485ca346dec333fa2142d670bb7d6e7058faf205957ebc59

  • Size

    60KB

  • Sample

    240424-w5x6gsfa5z

  • MD5

    4066b03dcae627d0c994bc8709c1b690

  • SHA1

    a7876ba3044196f04d956cf98642538ca71bdd18

  • SHA256

    8bb921e164ccea49485ca346dec333fa2142d670bb7d6e7058faf205957ebc59

  • SHA512

    9a218b20c63f9ecf3a56bbaa0b367eaa85caba15df352ccec9b3c754d5e62fb75a25b967df4245891135e640d4acdbccad524ae719d05b5ede7ac08a623a2c07

  • SSDEEP

    768:o8kXsqXMRKbsc+nJUlez5eYEqT5yXsqJRU7ihG1gfFNsHWP4jBS:907bszJUyeYEocJiu4gfFi2+A

Malware Config

Targets

    • Target

      8bb921e164ccea49485ca346dec333fa2142d670bb7d6e7058faf205957ebc59

    • Size

      60KB

    • MD5

      4066b03dcae627d0c994bc8709c1b690

    • SHA1

      a7876ba3044196f04d956cf98642538ca71bdd18

    • SHA256

      8bb921e164ccea49485ca346dec333fa2142d670bb7d6e7058faf205957ebc59

    • SHA512

      9a218b20c63f9ecf3a56bbaa0b367eaa85caba15df352ccec9b3c754d5e62fb75a25b967df4245891135e640d4acdbccad524ae719d05b5ede7ac08a623a2c07

    • SSDEEP

      768:o8kXsqXMRKbsc+nJUlez5eYEqT5yXsqJRU7ihG1gfFNsHWP4jBS:907bszJUyeYEocJiu4gfFi2+A

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX dump on OEP (original entry point)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks