General

  • Target

    69061775f1f50a59a99acbbde0771f30N.exe

  • Size

    45KB

  • Sample

    240725-eal2aszbre

  • MD5

    69061775f1f50a59a99acbbde0771f30

  • SHA1

    126b6a75c16128edf192b810a7df55606c7f2e89

  • SHA256

    ebd0417983358fe99d405ec03e53aabd803a73f3e3fbd67e58ae20f732f8e5c9

  • SHA512

    5d91adab6a6e35706f9ceb65403f0a4cd6148784218e8bfa3405bdb5c18a92f53eb9cb64493b26d953336268c1e836dbc99487ec42ec246d22e7491402795c81

  • SSDEEP

    768:IhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:0sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      69061775f1f50a59a99acbbde0771f30N.exe

    • Size

      45KB

    • MD5

      69061775f1f50a59a99acbbde0771f30

    • SHA1

      126b6a75c16128edf192b810a7df55606c7f2e89

    • SHA256

      ebd0417983358fe99d405ec03e53aabd803a73f3e3fbd67e58ae20f732f8e5c9

    • SHA512

      5d91adab6a6e35706f9ceb65403f0a4cd6148784218e8bfa3405bdb5c18a92f53eb9cb64493b26d953336268c1e836dbc99487ec42ec246d22e7491402795c81

    • SSDEEP

      768:IhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:0sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Discovery

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Tasks