General

  • Target

    ec4827be22c46517ba2b50f6e0e44a80N.exe

  • Size

    45KB

  • Sample

    240830-sy5efasdjj

  • MD5

    ec4827be22c46517ba2b50f6e0e44a80

  • SHA1

    97a0ab2f72a1c06e179d4a4a109506d58a2bc182

  • SHA256

    c261c764cd43277fd57cddc3da642d9050f5bb8ed40360531c88a23df6d4a36f

  • SHA512

    52f6d2464ea62936ae00fa8b9ac9fd4f75da2a491b8682b72808266542b9bc95bd193c61b51326c5ed018a2d90ce72c24e68ee4099b42e2c3995a07e733c7f93

  • SSDEEP

    768:1hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:nsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      ec4827be22c46517ba2b50f6e0e44a80N.exe

    • Size

      45KB

    • MD5

      ec4827be22c46517ba2b50f6e0e44a80

    • SHA1

      97a0ab2f72a1c06e179d4a4a109506d58a2bc182

    • SHA256

      c261c764cd43277fd57cddc3da642d9050f5bb8ed40360531c88a23df6d4a36f

    • SHA512

      52f6d2464ea62936ae00fa8b9ac9fd4f75da2a491b8682b72808266542b9bc95bd193c61b51326c5ed018a2d90ce72c24e68ee4099b42e2c3995a07e733c7f93

    • SSDEEP

      768:1hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:nsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks