General

  • Target

    6975b5da433cda1cd0c6c14b9c23bf20N.exe

  • Size

    45KB

  • Sample

    240813-wyytfayglg

  • MD5

    6975b5da433cda1cd0c6c14b9c23bf20

  • SHA1

    1ef3f9923a2680ba2e717232ecf9768014e4a90b

  • SHA256

    5ad0944a741bbd9cc337426965b0fbe32181b3eb83c0691713d5f3c5976187ba

  • SHA512

    5491a6f783e9fd962f47743a04ff6501a2d90fe6c63382bc13c8bdfcd213b0f0255eec27a107f984861535a6a46a2f8ef693b1e2d95e785f8b510ae90f4ff523

  • SSDEEP

    768:JhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:TsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      6975b5da433cda1cd0c6c14b9c23bf20N.exe

    • Size

      45KB

    • MD5

      6975b5da433cda1cd0c6c14b9c23bf20

    • SHA1

      1ef3f9923a2680ba2e717232ecf9768014e4a90b

    • SHA256

      5ad0944a741bbd9cc337426965b0fbe32181b3eb83c0691713d5f3c5976187ba

    • SHA512

      5491a6f783e9fd962f47743a04ff6501a2d90fe6c63382bc13c8bdfcd213b0f0255eec27a107f984861535a6a46a2f8ef693b1e2d95e785f8b510ae90f4ff523

    • SSDEEP

      768:JhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:TsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks