General

  • Target

    cc852d8bb2db8390df6adf53176e1df895d9cb30ffd1d37617fc4da8c6d62c8a

  • Size

    32KB

  • Sample

    240831-drne1ssfmh

  • MD5

    4a007e5b14528e3de1424831160c2d1c

  • SHA1

    3dbe91069ba8bc938422b6449dd5434c4cab8642

  • SHA256

    cc852d8bb2db8390df6adf53176e1df895d9cb30ffd1d37617fc4da8c6d62c8a

  • SHA512

    72baa46f6ab61e0d31c386ec0f60526578aae0237d300332f11178d0711842323c1740305d783b70e4a6f5e90c41b6fe9be9abdd146bc0804cfad4edf9cff86a

  • SSDEEP

    768:iJI6h6So1UcGE7a+PbHosrhrg4eUe/ysY2cs0P/ywpwwT:kI6h6Zbawrlgke/ysPvwpwO

Malware Config

Targets

    • Target

      1d4591134ce40073d5abfc5d6905ec0e32b78533a4459706b0c0da2086b05c74

    • Size

      34KB

    • MD5

      7a5d58c62db0aeef2b0a794c409800ca

    • SHA1

      3e1a245c7814e5dafe330f765377c50bdb902095

    • SHA256

      1d4591134ce40073d5abfc5d6905ec0e32b78533a4459706b0c0da2086b05c74

    • SHA512

      9462172c86efee5cd8a1aa1b061d47d4462f6dd1fd965f04c24a6f0730396c0a74283f07a5505789cb586567cca4380d5cf3ee9d07699f6b9191d70330586bee

    • SSDEEP

      768:Ap22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:ApYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks