General

  • Target

    8d60a63be25dba5557f689d30d1cd7c35f122f4c38ad18f2d5f7a70973352b10

  • Size

    40KB

  • Sample

    240831-2s6jzszemk

  • MD5

    ce69d0af61ea2c9ef76d64fc0f1cefbb

  • SHA1

    343b3bce20502a12f1ba71c769567d0ecbc85fd6

  • SHA256

    8d60a63be25dba5557f689d30d1cd7c35f122f4c38ad18f2d5f7a70973352b10

  • SHA512

    5ad828803be20da4bac5a1be96256a86e71d7d901c3b5d41042cd857a632a883ffe9c5b3ac7917af738f21a0db7b47b1ee9e8b4ac6353604688c2326d75ff980

  • SSDEEP

    768:O+6JoeY1QOuwzVd02C9Woxp/+AiOpbR350HRs03GwiLTav:OnH1JpVfJss03ITav

Malware Config

Targets

    • Target

      ba87769b40804b895b8b524fe9a45b44d51ceb4966088c57c79407c3dc4616bc

    • Size

      160KB

    • MD5

      d589041bdfc1adbabfaaa7a333dd90d4

    • SHA1

      70f7c06a22a0ae64127ec1b5903afbcdbf4dcc36

    • SHA256

      ba87769b40804b895b8b524fe9a45b44d51ceb4966088c57c79407c3dc4616bc

    • SHA512

      3ea1488eea9ff8c36f213ae2198c3b5fe227aa0097c09191e0962736df167f8218c82fa3ee88ace61c7d09fbb0653dec817a6b0da319cea7c9aa571dca06d452

    • SSDEEP

      1536:BEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:KY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks