General

  • Target

    4666d2aacc8f8efd84a465e5df200420N.exe

  • Size

    34KB

  • Sample

    240830-nqj2basana

  • MD5

    4666d2aacc8f8efd84a465e5df200420

  • SHA1

    eeb5d9e29cd55b5bea8b452cc3a0b20f50fb3729

  • SHA256

    e894be6f2687cd68c4dd6313772a2362bb4e3e5cca96d9f471e25e4ed6d676e7

  • SHA512

    f24f828f8513ef8631f18c9da2ae4929b544f043ce80a672de7b84dc1e466020a577e09dd14bb688f26ace9d45a602323c4bf174cd98d8d58d3cf8625f1c7db6

  • SSDEEP

    768:7p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:7pYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      4666d2aacc8f8efd84a465e5df200420N.exe

    • Size

      34KB

    • MD5

      4666d2aacc8f8efd84a465e5df200420

    • SHA1

      eeb5d9e29cd55b5bea8b452cc3a0b20f50fb3729

    • SHA256

      e894be6f2687cd68c4dd6313772a2362bb4e3e5cca96d9f471e25e4ed6d676e7

    • SHA512

      f24f828f8513ef8631f18c9da2ae4929b544f043ce80a672de7b84dc1e466020a577e09dd14bb688f26ace9d45a602323c4bf174cd98d8d58d3cf8625f1c7db6

    • SSDEEP

      768:7p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:7pYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks