General

  • Target

    81dc0d4731ef09ddf32720d5448b1539e82ca9d7db8d73953a7904bf62b80e1d

  • Size

    32KB

  • Sample

    240904-rej4qa1gnm

  • MD5

    fbc8823fe5fbbe0b84d12bd2b7dbd4c5

  • SHA1

    f6849ff44deaff98f48aa155f65aadc6ff79e39d

  • SHA256

    81dc0d4731ef09ddf32720d5448b1539e82ca9d7db8d73953a7904bf62b80e1d

  • SHA512

    c25d58e706511697e0f054d3d90f7656f03a3b9ffcf9dc962c89aad1800b816fa64b6e98144154ac54da9e457b8e70ed22098d586202ad870cad4b6f15cf1c5a

  • SSDEEP

    768:D9fyacaWbFCJbIipM8vp01/bwaRtlUNAACdKIHP:D9qacaeFzipMGp0tbwaRLUNAvdKIHP

Malware Config

Targets

    • Target

      ab2c3b13eb7e6a4778676adc4279b8faff9769b5e561de770bff0f8e2f1687ab

    • Size

      34KB

    • MD5

      959948adae63fd46c460fa276e6a80a7

    • SHA1

      76f2ee006fe888043c754bf7f54e352fd06e400a

    • SHA256

      ab2c3b13eb7e6a4778676adc4279b8faff9769b5e561de770bff0f8e2f1687ab

    • SHA512

      587c9f05075c35713458ff4bbf3b752ae653c16bd37b9d196d46f56b65c23b37402ba9f711e5d6bf0dd86e125bb2d1cf11e20423e089e1b6e7ce62e331bb2ed4

    • SSDEEP

      768:3p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:3pYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks