General

  • Target

    a605653ee2452483b8cd983e037224e0N

  • Size

    45KB

  • Sample

    240826-2fdnfaydre

  • MD5

    a605653ee2452483b8cd983e037224e0

  • SHA1

    3f1887f122314da938be096417c80b78928473f4

  • SHA256

    4f95c3dd41365f510fda26a5d062007d76a893863fc3735b43b5036c0a68af6c

  • SHA512

    d395487996bfc00e95e57eef33f9ca5babee80ff8ec2c9b31132d1e136781ca4fae3dcf262594cd62d4545d2577797878619c3fdc70540820707e36af29a769c

  • SSDEEP

    768:xhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:LsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      a605653ee2452483b8cd983e037224e0N

    • Size

      45KB

    • MD5

      a605653ee2452483b8cd983e037224e0

    • SHA1

      3f1887f122314da938be096417c80b78928473f4

    • SHA256

      4f95c3dd41365f510fda26a5d062007d76a893863fc3735b43b5036c0a68af6c

    • SHA512

      d395487996bfc00e95e57eef33f9ca5babee80ff8ec2c9b31132d1e136781ca4fae3dcf262594cd62d4545d2577797878619c3fdc70540820707e36af29a769c

    • SSDEEP

      768:xhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:LsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks