General

  • Target

    fe3a707a4e3bdc31baf1094855532608.zip

  • Size

    32KB

  • Sample

    240901-1b6yrasbqm

  • MD5

    13cef7020423fdbe6cd5fa219045ef34

  • SHA1

    33d1a4afb773ea8078f8c375d0403bd484c33318

  • SHA256

    1042fe6e5f7dc8bbe5c3bae017ecf41edad030fe64c8f7181db6c10803e4264e

  • SHA512

    6acac036b05e5c9511e37e6945b123f186228ef2e49e8a2dd2726687954cd422b6abba2390b0a621fa8ff5bd90a8da72caf4359949d772b8948a92691557486e

  • SSDEEP

    768:cCb7F0LImF9F5AJ0WZ1baCjXqjVkjJpCvJF:/3FVA5AACOjGVaT

Malware Config

Targets

    • Target

      209964fe328802e1b57a676e9560ebcdfb46c6e04d45ba3200fb210d251ae7e0

    • Size

      34KB

    • MD5

      fe3a707a4e3bdc31baf1094855532608

    • SHA1

      98a72827fb131b19057a30b28a7e0b4de15bdd7c

    • SHA256

      209964fe328802e1b57a676e9560ebcdfb46c6e04d45ba3200fb210d251ae7e0

    • SHA512

      241375c297752c805b68dde7b1f5a1e380acdaaa3930b81a86d2fc367c6396eafa7631a167ad0e802009e3e98081e52b5e28999558ac599ac37bbbd7f0ac3e2b

    • SSDEEP

      768:kqp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:kqpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks