General

  • Target

    f2d2f7b958d8affc9fe31891860e22e0N.exe

  • Size

    45KB

  • Sample

    240824-asbwtswbmd

  • MD5

    f2d2f7b958d8affc9fe31891860e22e0

  • SHA1

    88c5e5e468cc81781acc79058cb6d572362df964

  • SHA256

    339e8f0854d2c3cc29e4c21bef4d104b49d3e9f461c5448ff669d8ccb9424b13

  • SHA512

    213735de8e0ec07a2a19ed0f53b6ca975c074d9ccfd2344c509dc8a18b25ad3a64376c53ee2dc8dc971ec6536cd636b9f695c67d77ac2c2c435813d4e279d8dd

  • SSDEEP

    768:bhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:dsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      f2d2f7b958d8affc9fe31891860e22e0N.exe

    • Size

      45KB

    • MD5

      f2d2f7b958d8affc9fe31891860e22e0

    • SHA1

      88c5e5e468cc81781acc79058cb6d572362df964

    • SHA256

      339e8f0854d2c3cc29e4c21bef4d104b49d3e9f461c5448ff669d8ccb9424b13

    • SHA512

      213735de8e0ec07a2a19ed0f53b6ca975c074d9ccfd2344c509dc8a18b25ad3a64376c53ee2dc8dc971ec6536cd636b9f695c67d77ac2c2c435813d4e279d8dd

    • SSDEEP

      768:bhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:dsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks