General

  • Target

    2abb82a00fb206277d588410c82c50cb.zip

  • Size

    32KB

  • Sample

    240903-s1m8ya1gna

  • MD5

    412bd57f808bd34eeb11d594d79893a1

  • SHA1

    bf6c93f4d3c08db78454faefb3a800553e8b778b

  • SHA256

    6fe58f8cc703053e88853b2b20f55310d4b3a6582708d4a30078241ecce02374

  • SHA512

    030e7b8b59668f7a10b8dd6ec9069eb563d2d5e85274326c522419d011c62675766ff39d73ba8868ffe377a9cbf71bd252ef3a76cd61fc1c25dce69cb748a1c3

  • SSDEEP

    768:xGfqHTIh0/G0mGn0XsSpineYA2N2sVwiLfiV3jF8hxwJ:xkqzzAGnCYAJQLfiV3Ohx2

Malware Config

Targets

    • Target

      51519e60ffa732ef5435439debbc86a6dabb99b1f104b88480a9da9e4b20a239

    • Size

      34KB

    • MD5

      2abb82a00fb206277d588410c82c50cb

    • SHA1

      7f46c54ccaf3693772478b2ef414dade96ff4be0

    • SHA256

      51519e60ffa732ef5435439debbc86a6dabb99b1f104b88480a9da9e4b20a239

    • SHA512

      44dbd0a08dd5419725abf47fd17110e310c381e8a8eeed4c28bd9458bd774eb7cd78b8e684ca9ebb35a7fa4e2528b3693cb5a3709dacfad5352bfe5ed7400531

    • SSDEEP

      768:Ump22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:5pYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks