General

  • Target

    c8c4fa472338d372697661942bbac360N.exe

  • Size

    45KB

  • Sample

    240825-kqgdmsvgkg

  • MD5

    c8c4fa472338d372697661942bbac360

  • SHA1

    b236b415bc66818739f5a0730eded9ff414fae02

  • SHA256

    52fd3a302b0381ff26184c0253080ea368c5d7d4b4920cf74f8bc08fe555651e

  • SHA512

    d94fe370e28c69302fbce5a56439551ce2f96c59c553b169a12c909b9929890055fb03257c020cae14d7592c756a0f1d89c15ecef646980a9502b55a9cb623f9

  • SSDEEP

    768:EhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:osWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      c8c4fa472338d372697661942bbac360N.exe

    • Size

      45KB

    • MD5

      c8c4fa472338d372697661942bbac360

    • SHA1

      b236b415bc66818739f5a0730eded9ff414fae02

    • SHA256

      52fd3a302b0381ff26184c0253080ea368c5d7d4b4920cf74f8bc08fe555651e

    • SHA512

      d94fe370e28c69302fbce5a56439551ce2f96c59c553b169a12c909b9929890055fb03257c020cae14d7592c756a0f1d89c15ecef646980a9502b55a9cb623f9

    • SSDEEP

      768:EhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:osWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks