General

  • Target

    c84f359ca4a82263c4b41b713eaf2750N

  • Size

    45KB

  • Sample

    240907-11va9azgmf

  • MD5

    c84f359ca4a82263c4b41b713eaf2750

  • SHA1

    4880d3949caa1965a48df54849989b83bf4c526d

  • SHA256

    e4498e8f0db9ced7259ce39cadb4066124800133b298fa45c9bc6445833d1040

  • SHA512

    350cb40ab08daf27cb530bb98b3c1277956a6197effc05d4bc59cd1fa2ba028b9218e521b3e7fd172fa3c8644c04aa325db786a1074922ce1df8b178d7b33a30

  • SSDEEP

    768:shP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:AsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      c84f359ca4a82263c4b41b713eaf2750N

    • Size

      45KB

    • MD5

      c84f359ca4a82263c4b41b713eaf2750

    • SHA1

      4880d3949caa1965a48df54849989b83bf4c526d

    • SHA256

      e4498e8f0db9ced7259ce39cadb4066124800133b298fa45c9bc6445833d1040

    • SHA512

      350cb40ab08daf27cb530bb98b3c1277956a6197effc05d4bc59cd1fa2ba028b9218e521b3e7fd172fa3c8644c04aa325db786a1074922ce1df8b178d7b33a30

    • SSDEEP

      768:shP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:AsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks