General

  • Target

    cd6b77fb20354a499791cf9e0422fc01127a7041812600b3adce4796a9f9ed56

  • Size

    32KB

  • Sample

    240831-j5chkatfrl

  • MD5

    833f923729a4d836d3319a50d0b3f570

  • SHA1

    908541f1d2ae288892b6713981526f77a3761a16

  • SHA256

    cd6b77fb20354a499791cf9e0422fc01127a7041812600b3adce4796a9f9ed56

  • SHA512

    49c56621611e3820cadf25e53d126739b60ebce4cdf0074b168a08c8c7a6504e3c7c5d7a5044cb1c8f62d84d204e97a385d1233d4b6e26c93a7de796a1be61ce

  • SSDEEP

    768:qOucESDqrBTssUmTtcwnkDdsjDHkEaIU88T:qOuyqVLP+dsjjs

Malware Config

Targets

    • Target

      ba3e0514b68ab3b610e59ca03f51545014a63ebbcee25f36af3468e6a565254c

    • Size

      34KB

    • MD5

      9c4ba08904f202f6f2f1da55c246ff62

    • SHA1

      b32dfa4669d3dc0ad901b0bf54b5b642d7fd6e3d

    • SHA256

      ba3e0514b68ab3b610e59ca03f51545014a63ebbcee25f36af3468e6a565254c

    • SHA512

      6e869ff275585c8ef04cd7492a00ae113af6c826439d1fc5aa5a4e728c53eb065c54b4a45d46c1bdb4910cd21c4c7446a43c71257954cba1a3f8aa416bbc3b21

    • SSDEEP

      768:dp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:dpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks