General

  • Target

    3a81c89b51782ec58e89552dbff2bfbf9188f20b53bbfd30c0682e11d7a55a2c

  • Size

    36KB

  • Sample

    240904-m2bcwayclq

  • MD5

    614a071de7e006fd3c3c2b9cc9f3215d

  • SHA1

    ce1a7f0036b54ea80e6f998fe14860c4ab469944

  • SHA256

    3a81c89b51782ec58e89552dbff2bfbf9188f20b53bbfd30c0682e11d7a55a2c

  • SHA512

    05aec203cc49983d24858c613653a0e071d8d91a656795c34a216cb1724ad57ad66cb4f34688363d61fd3d0e79abbab15c2404e5fc12617c3734b5cdde12df46

  • SSDEEP

    768:aidna8S71mA4Wvbii+VyFdPpwwSZytceaFYtGW6SO9ttDNWqbnXAEMvq7q:5Na8UPeiI47SZisFYtv6bttDQinQEMvH

Malware Config

Targets

    • Target

      24101fcae7a5adcb398d49c56555361d62d093cbdc53e4d07472ec15580cf7b3

    • Size

      89KB

    • MD5

      6894d3613722f9190563365dce8e9217

    • SHA1

      5dc821f88856b48048726fdacc06787d9f600ae0

    • SHA256

      24101fcae7a5adcb398d49c56555361d62d093cbdc53e4d07472ec15580cf7b3

    • SHA512

      96d7effd1aa34dc257e9117b4171e3b607baf64946b898b985a4c5e31ee7f9ac4b80a93224ec2646cf1c1b6e2cdcf65564e686dfd034ff1e3a8e57afc7c4cfb8

    • SSDEEP

      1536:1r+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:J+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks