General

  • Target

    b36903144bd32c1090633fcc056ff11d.zip

  • Size

    32KB

  • Sample

    240903-meyvnatgkp

  • MD5

    70acc8670bef55375c6b5ec95a15b927

  • SHA1

    edfa998668b4d73447b1b0b6c0eb1f28bab880e7

  • SHA256

    a5dd6bdc9a50c773f1b96e90a717fe3ef24c44e988cd07d40e1561d6bf76c375

  • SHA512

    5a1d02ea007b4fca02426fe47445ba1c649f4d0fedfcccf8cb87fb6bfcb051a9e8bc0f1707417e19f05d88866efd7126b0f530ee9cca31e4440cdab6bffb677a

  • SSDEEP

    768:zocNzWlCwbvHlCpds9ZlSo4fdR8/920YHi:ccMgOQvMZl4P8/9tqi

Malware Config

Targets

    • Target

      c4ac111d3acbe526568ac988170d1fb0c0be4869ded07b650c74e1e77588c27f

    • Size

      34KB

    • MD5

      b36903144bd32c1090633fcc056ff11d

    • SHA1

      5dda87571d683cfc5b1953011acbf21a3d195471

    • SHA256

      c4ac111d3acbe526568ac988170d1fb0c0be4869ded07b650c74e1e77588c27f

    • SHA512

      0f91c7a2775e6abefe57dfdab788c9ed72bd9ec06ded6fec9e954fd5c3a0a663e76d6def5cf343caf61952577460c6e2e3c44dae0d64b064581c0b05fb7bc1f6

    • SSDEEP

      768:2p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:2pYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks