General

  • Target

    268140c55f4c31cf0873a151ca3e0eac.zip

  • Size

    32KB

  • Sample

    240831-k64h4swemg

  • MD5

    49356f633dea2faeeb81edb698196d15

  • SHA1

    1f1b283d5ea79205aca0e1645bfe4688ee08610d

  • SHA256

    41efb838fa43f0ec9366417d1f12fe4702e486feb3b363b99709e0392265c094

  • SHA512

    9a02f13cb45e142da615989f36f21f69e16f5c5feeed1451786753b8928c12c809da91a40088cbeaff31ffd0a7a615af77a84cade9503853a8b7a0cb2ee6ea2c

  • SSDEEP

    768:T556BKqEWMonzuhTttSGMrrbEs6/cZGxp9Ml9oS9jf:TnY3HzuhPMb7+7+979L

Malware Config

Targets

    • Target

      9b615f38bba336dc42c27684b19119780acb7e7c7f5a200f6f75cb5feedcd27d

    • Size

      34KB

    • MD5

      268140c55f4c31cf0873a151ca3e0eac

    • SHA1

      58ab5c2a79467ece4585d6b96c62b63ba010ee93

    • SHA256

      9b615f38bba336dc42c27684b19119780acb7e7c7f5a200f6f75cb5feedcd27d

    • SHA512

      0b8b738a96c5808478f4ddf950bea015f8a8a745ee5ce8d120b5465531dc1237cdf5261ab450b97d7e4c2060751157bf8fff4f712c979bc9ec3121871ed94f8b

    • SSDEEP

      768:cp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JX:cpYoX58z1uirL98xMWnT0OQ9JX

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks