General

  • Target

    f3264cbd54dee6100118b22c09a3251c.zip

  • Size

    36KB

  • Sample

    240901-ccry8aydnb

  • MD5

    b49f2894aac0a2e57929d4be4c2d9b36

  • SHA1

    9a30820b315ffa230c4af4e10cfef50afeb455b0

  • SHA256

    b123d0401e44a07fe8bab5f724746be888be93f81fb7304f075d35f2a20fd1f2

  • SHA512

    db547e737cc902e90fde6d142db8a6d6c6d2a5ceb123f36136306ce0586b31ad910ae3cc9b39f8901beab30b7f0171446f91462d4e4e4b65af09f1bc368e4eb2

  • SSDEEP

    768:3LKE3sjCHdRSH8PCtq82P73TMSm1mHOXCCdZukRObSnaqteFDmU:bbaCHdRScPCty4SehXJ3YbvzxmU

Malware Config

Targets

    • Target

      2547f2839e8bed94cb840e417e7d47670f1665ee6448b2ed98a63f5c47e85744

    • Size

      89KB

    • MD5

      f3264cbd54dee6100118b22c09a3251c

    • SHA1

      4c96e95d86e72aeebcb61ceccdd22e9c9e898c33

    • SHA256

      2547f2839e8bed94cb840e417e7d47670f1665ee6448b2ed98a63f5c47e85744

    • SHA512

      8a682cdf585921238ccefe8c2e5a4d7c346962ff842e132eb8ed8fc675c25473705064a49a7b025fd61a44030f27d80814858f3b5c80605e34665bee8efb1bf3

    • SSDEEP

      1536:xr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:1+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks