General

  • Target

    5a97d7b03b718441c0ffe79f9b03175b.zip

  • Size

    36KB

  • Sample

    240831-bq2j5sxdqd

  • MD5

    7f49c9d4575f2ed76866ea83f5fbcbc0

  • SHA1

    b4835d8468da7ceb185c7e22ddab792772b0b588

  • SHA256

    488730e164da11093ee155fe0abfaa221564fcd8a8b8ade07ff4151b963c04e4

  • SHA512

    6bca5fd8034cb17140628e706ea74904e09da8968947e48686931367a5d0d805491f79466963e129e84aee4af0ab2b6ef7e060b3b2ee9fef154a3b3419ae322f

  • SSDEEP

    768:2tDadsQMDllH8c188AFP3BNjqVstgDfEXF9AeT1c1uRY3akc:2nQMJlcKAFPxNjqyIMV9L3Y8

Malware Config

Targets

    • Target

      dc8c35f9f4d44e4a7ef7ae445b7f016e5d208894deeed047dcaa5e7fc4faa401

    • Size

      89KB

    • MD5

      5a97d7b03b718441c0ffe79f9b03175b

    • SHA1

      746621849c1d0341a2ad5dfc015167a576814e23

    • SHA256

      dc8c35f9f4d44e4a7ef7ae445b7f016e5d208894deeed047dcaa5e7fc4faa401

    • SHA512

      d598cbd72d9d23a7c46d5dd693922e51dc690b593b233d3bf277206e1e028a52527574a9355e64e50fff126f4e98364de0c79da1d68c80786fa7512182f64849

    • SSDEEP

      1536:Hr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:L+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks