General

  • Target

    f5cbc3bc10982f37113ad3668b1636f0N

  • Size

    110KB

  • Sample

    240909-18rv4avfjb

  • MD5

    f5cbc3bc10982f37113ad3668b1636f0

  • SHA1

    9904644e65d8490b42c9b97e84b8ae044be74293

  • SHA256

    7de6d73a488d4f752b3c97c09267b013b465fd271838c9fcc51cefdaf00003fa

  • SHA512

    ea8d56cfba10e1849b910bc50175714e6b840f90517e876a24411e9627ff01760cff40402a7d3cc5d73c433deca7c6b0a693b1883bcf2d9e5285fb273bc9519f

  • SSDEEP

    1536:niLOvRmmQegJgBbmAQ256/ZrwWnwqjhurmKFcxL8JQ28SGd:niyvRmeLs/ZrwWJjAqGcRJ2xS

Malware Config

Targets

    • Target

      f5cbc3bc10982f37113ad3668b1636f0N

    • Size

      110KB

    • MD5

      f5cbc3bc10982f37113ad3668b1636f0

    • SHA1

      9904644e65d8490b42c9b97e84b8ae044be74293

    • SHA256

      7de6d73a488d4f752b3c97c09267b013b465fd271838c9fcc51cefdaf00003fa

    • SHA512

      ea8d56cfba10e1849b910bc50175714e6b840f90517e876a24411e9627ff01760cff40402a7d3cc5d73c433deca7c6b0a693b1883bcf2d9e5285fb273bc9519f

    • SSDEEP

      1536:niLOvRmmQegJgBbmAQ256/ZrwWnwqjhurmKFcxL8JQ28SGd:niyvRmeLs/ZrwWJjAqGcRJ2xS

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks