General

  • Target

    a9796eb70e262d3b59103f750abd3bc0N.exe

  • Size

    45KB

  • Sample

    240814-ped7cswekj

  • MD5

    a9796eb70e262d3b59103f750abd3bc0

  • SHA1

    c5da0ff25ed1af1cda280181cb768835fbb757f3

  • SHA256

    b14b860edb448ffe20ed9e0b98ab9d1789a2cf00f98e4ee2b7c15a12889e69ef

  • SHA512

    d9a63aceea6ffa03ff13b4ac31128f17dc21138f3d3d5c718a447cf911ddd1123cabaa0415770fc367d24df03af2e24895c1d4bd671a7e760f30407cc3cb7d04

  • SSDEEP

    768:GhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:KsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      a9796eb70e262d3b59103f750abd3bc0N.exe

    • Size

      45KB

    • MD5

      a9796eb70e262d3b59103f750abd3bc0

    • SHA1

      c5da0ff25ed1af1cda280181cb768835fbb757f3

    • SHA256

      b14b860edb448ffe20ed9e0b98ab9d1789a2cf00f98e4ee2b7c15a12889e69ef

    • SHA512

      d9a63aceea6ffa03ff13b4ac31128f17dc21138f3d3d5c718a447cf911ddd1123cabaa0415770fc367d24df03af2e24895c1d4bd671a7e760f30407cc3cb7d04

    • SSDEEP

      768:GhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:KsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks