General

  • Target

    e68080a8c07c4208564f25bfb993cc20N.exe

  • Size

    160KB

  • Sample

    240909-m2eqaswgrc

  • MD5

    e68080a8c07c4208564f25bfb993cc20

  • SHA1

    d4da661a6154213deb413654f7b24ee78314cb21

  • SHA256

    b1c2c0cbfb0d08c60e070067145d8da49db21cce22d186cf92c6f0607587a125

  • SHA512

    13cfb37eaef30f83b36cd6195319ab423a0da0a0d3340aef31cd551a20f82f365597c1658457f62d3c40c49a3b8457da162fa91ad4f889c6fc146f61007880e9

  • SSDEEP

    1536:IEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:LY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      e68080a8c07c4208564f25bfb993cc20N.exe

    • Size

      160KB

    • MD5

      e68080a8c07c4208564f25bfb993cc20

    • SHA1

      d4da661a6154213deb413654f7b24ee78314cb21

    • SHA256

      b1c2c0cbfb0d08c60e070067145d8da49db21cce22d186cf92c6f0607587a125

    • SHA512

      13cfb37eaef30f83b36cd6195319ab423a0da0a0d3340aef31cd551a20f82f365597c1658457f62d3c40c49a3b8457da162fa91ad4f889c6fc146f61007880e9

    • SSDEEP

      1536:IEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:LY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks