General

  • Target

    252b2cc4015380b95a9c56472ac66497.zip

  • Size

    32KB

  • Sample

    240830-2yaz9s1crg

  • MD5

    543da17d15915e8233b78eb5f0992403

  • SHA1

    3aa37da47d6b95246b43c767846e010f5b6eed6f

  • SHA256

    ee06107f8c49119e738ba90b64069985ebd2116f797a4e0272390b75380bbebf

  • SHA512

    70e93edf78bcdf510325434529ea8a41f74d9c987d58c4b564fe2c768a6152472b35389bd99dd692946e2e9dec5da7faa8197841606cba58ac2e35a5ca482b84

  • SSDEEP

    768:c3Q4iy1XM4a7gZLB/cSlZ299oCEXXaRLiNBR74hVmMgruloqSr/:kQ4iyFB9f29nEXXaJiXR8XHU/

Malware Config

Targets

    • Target

      bb57cae4af477abbadfbab5f445d89308b1527d741ce439dcad40fce2b56c9f7

    • Size

      34KB

    • MD5

      252b2cc4015380b95a9c56472ac66497

    • SHA1

      1384570904352a4663f1c13934b2ebf9dd7fe047

    • SHA256

      bb57cae4af477abbadfbab5f445d89308b1527d741ce439dcad40fce2b56c9f7

    • SHA512

      bec180c5aabed61810cd50d32191916decf811c6174bc5b2278a7f36ead58240f2391e43ef02d17a353dd545fe721296ee8203573dbab554698e6dc5df0f2e7b

    • SSDEEP

      768:Hp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:HpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks