General

  • Target

    8ead2c95f7d0ddfa2080fc1308dd91c9.zip

  • Size

    32KB

  • Sample

    240831-mxgdbszbrj

  • MD5

    6be63d6a43626b6010536f811fbc7f8b

  • SHA1

    9e855135a2a3beab6b67bce3262bc9ec048cfd6d

  • SHA256

    095a3a72f78a1dd7f9ca428da801df8f5b3037a6d39d05e07af04c015563e328

  • SHA512

    f68e169badcdcdb0e4a7e1340d3ea7f3537eb437734c7dff0a07fba229879c39d4b4010a46a57180b0e180e2b741d1f29a4d3e3e7cefe5e98046e7ebc7d559bf

  • SSDEEP

    768:/TF54KaifCVVRleEo6iTRqzs/c/bqsVSosnet2DBSZ:/TpO3RleEopdqQUX8neUwZ

Malware Config

Targets

    • Target

      a7395220524deefe2161e5c9fdbe8cd5a151171a180c9df0f9f9400c39438311

    • Size

      34KB

    • MD5

      8ead2c95f7d0ddfa2080fc1308dd91c9

    • SHA1

      7ea59a470e3af6f5eaaca50a36fbb1af369a4cb1

    • SHA256

      a7395220524deefe2161e5c9fdbe8cd5a151171a180c9df0f9f9400c39438311

    • SHA512

      7c22a57541483feede9cdd8d8cb48dd2ec4d0e5d004629dbe1facc7c42b3afc6797467b3876b4e0029660f7f06bf62122ac7d72b0ab9809a9c0cf9f48556e7a7

    • SSDEEP

      768:9p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:9pYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks