General

  • Target

    8438f95cab6ca4e28d44695d5a207a1a49e6a756df8ade1cc6ed857847967314

  • Size

    32KB

  • Sample

    240831-2s9awazfpe

  • MD5

    8dc742b7c9b55784d094d6760429eec1

  • SHA1

    92e59bb25d60495a2bb704609b0fcaecfbf7c30d

  • SHA256

    8438f95cab6ca4e28d44695d5a207a1a49e6a756df8ade1cc6ed857847967314

  • SHA512

    e43b184a471c9836b8e450579af6e8ef306c611df67f5359edb1edde39bbcecdb9d3612060d571d54398eab7dbddbf156ec2a8baf4c107ae68420d473c07cdc2

  • SSDEEP

    768:hXh2Lvx1vTi/MGcTy0pnTI8c8ynjsu8cPgvZ1c:h011vaMa0p06yn1EZ1c

Malware Config

Targets

    • Target

      122487611298d9115885fccf2a40f816c5150b136e38a414ea05df53b652e191

    • Size

      34KB

    • MD5

      9e4f8b008b9cde7875029850efa86ade

    • SHA1

      46454d4209af403e3afed59e21cfee2ec596ba04

    • SHA256

      122487611298d9115885fccf2a40f816c5150b136e38a414ea05df53b652e191

    • SHA512

      bd5a522f509159eaba8b9beeccf39603daec79912c0fd3aa37f98c6c9b4e718bd91172f02dda8055d4855454064d7245351c50803036dc7b3aa19aac4d5c3d6b

    • SSDEEP

      768:Mp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:MpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks