General

  • Target

    871ea1b1c08486f19b1128016b0e5760N.exe

  • Size

    45KB

  • Sample

    240817-dh2laatdpg

  • MD5

    871ea1b1c08486f19b1128016b0e5760

  • SHA1

    a048a6ed7d093bab900c647678540f853cfa9905

  • SHA256

    4cc145aeae849e9045213b956470845509ce1409ac997c402e0d59fa38bf8a43

  • SHA512

    d2b027c8004e28a904f6564d2b8a07d6ea74fd68f5e3be07da63334a62fcc650d21bd6b4777b9a47ef33d9f93f0f2bff60ba354de2fbb682a8176e02c7a85981

  • SSDEEP

    768:khP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:IsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      871ea1b1c08486f19b1128016b0e5760N.exe

    • Size

      45KB

    • MD5

      871ea1b1c08486f19b1128016b0e5760

    • SHA1

      a048a6ed7d093bab900c647678540f853cfa9905

    • SHA256

      4cc145aeae849e9045213b956470845509ce1409ac997c402e0d59fa38bf8a43

    • SHA512

      d2b027c8004e28a904f6564d2b8a07d6ea74fd68f5e3be07da63334a62fcc650d21bd6b4777b9a47ef33d9f93f0f2bff60ba354de2fbb682a8176e02c7a85981

    • SSDEEP

      768:khP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:IsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks