General

  • Target

    2e7d5e2c3a40c33f6d7a633c90f480efc7b4c1243d6a358570ef0653050e4144

  • Size

    36KB

  • Sample

    240901-xnbrlazdma

  • MD5

    35aa0db797925e7564708d6ea4b448c6

  • SHA1

    8fe82fdf0aa2473ee7a6a1bb42968308836956d4

  • SHA256

    2e7d5e2c3a40c33f6d7a633c90f480efc7b4c1243d6a358570ef0653050e4144

  • SHA512

    01a4ce11eb53d3ea4bc37a4b7869701a0967fef9fb2271d3bc7d6b910531199db1daabd06d75636b216a77fdef040b62bd0a5e31fed907b5634cab3b158ae66b

  • SSDEEP

    768:Wg27x4vTzCGCQjhTfsaf/eaqXt59YuOcST4L1+vp+UYt3pFjx:Wg27wPtUaf/eaqXGfzYY+Z55x

Malware Config

Targets

    • Target

      524e2e24834e0a335f3b62dce627696b826820bd4e14de80a2359b26c5e898e6

    • Size

      89KB

    • MD5

      84d7240ad0abeeb45fad6c23cee9dd51

    • SHA1

      d74ac44cbe0321018e1e43244c1743268cecb031

    • SHA256

      524e2e24834e0a335f3b62dce627696b826820bd4e14de80a2359b26c5e898e6

    • SHA512

      a35e330218e6409693aa041dbea6af61fd4257f9da84f6268ae9eaabc5f4ed03f2beee3848f9837ee0a8770d619d68b63a53503c23538d374dca7e6563334191

    • SSDEEP

      1536:Rr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:V+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks