General

  • Target

    9c32ada7436274394e9166c098828a40N.exe

  • Size

    45KB

  • Sample

    240816-1cmlhasakk

  • MD5

    9c32ada7436274394e9166c098828a40

  • SHA1

    480aad0b3e92af808439be5b009297e005a956a1

  • SHA256

    ae49df75d88a95746ab8edb0bd8a5a3201bdb5dd3b52fa931bf7a20b691cd424

  • SHA512

    b57804aa041540c5a63389112dfbb1deae21ecc19eb5432a50f7cb9b7026e624cb82f907213c37e8911cc4d439dcf585e2e925f94f9e76f5ce04e6fa86e8c94c

  • SSDEEP

    768:lhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:3sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      9c32ada7436274394e9166c098828a40N.exe

    • Size

      45KB

    • MD5

      9c32ada7436274394e9166c098828a40

    • SHA1

      480aad0b3e92af808439be5b009297e005a956a1

    • SHA256

      ae49df75d88a95746ab8edb0bd8a5a3201bdb5dd3b52fa931bf7a20b691cd424

    • SHA512

      b57804aa041540c5a63389112dfbb1deae21ecc19eb5432a50f7cb9b7026e624cb82f907213c37e8911cc4d439dcf585e2e925f94f9e76f5ce04e6fa86e8c94c

    • SSDEEP

      768:lhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:3sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks