General

  • Target

    c52b08f313a367154a2a644e8705e760N.exe

  • Size

    45KB

  • Sample

    240909-nzllhaydme

  • MD5

    c52b08f313a367154a2a644e8705e760

  • SHA1

    6eaaead1420edc393cf6135989189324b9c84de6

  • SHA256

    7054e17c2620f49314df51d82007e3558858d073a43225dd966469122faf8282

  • SHA512

    478b9dba28e0a2b1455313ec7b46477eae23492896069a8bcd5f5bf937a76ca2b58ad04cf72bc35e9a4736f1fcf31dec813d93e726863777d1091d83e15cd353

  • SSDEEP

    768:MhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:gsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      c52b08f313a367154a2a644e8705e760N.exe

    • Size

      45KB

    • MD5

      c52b08f313a367154a2a644e8705e760

    • SHA1

      6eaaead1420edc393cf6135989189324b9c84de6

    • SHA256

      7054e17c2620f49314df51d82007e3558858d073a43225dd966469122faf8282

    • SHA512

      478b9dba28e0a2b1455313ec7b46477eae23492896069a8bcd5f5bf937a76ca2b58ad04cf72bc35e9a4736f1fcf31dec813d93e726863777d1091d83e15cd353

    • SSDEEP

      768:MhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:gsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks