General

  • Target

    3dc052ff3eafd48a49d1c2c6e680b200N

  • Size

    34KB

  • Sample

    240909-pr3eqazglb

  • MD5

    3dc052ff3eafd48a49d1c2c6e680b200

  • SHA1

    f41c4cbe25d977ad44099fc3143de00a0a2e01e2

  • SHA256

    edbc742a348ffc995258f5dcf4c4eab43ebcda493da555cc01f013159eb7c211

  • SHA512

    9c14e65370330b7b9a3340422d20853d0f47f88b60d9e75752867bd59e8d30b75aebb5ca5db992fa3d7dda49328b8ce29656457868291a666c2404bb653ff6d7

  • SSDEEP

    768:Op22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:OpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      3dc052ff3eafd48a49d1c2c6e680b200N

    • Size

      34KB

    • MD5

      3dc052ff3eafd48a49d1c2c6e680b200

    • SHA1

      f41c4cbe25d977ad44099fc3143de00a0a2e01e2

    • SHA256

      edbc742a348ffc995258f5dcf4c4eab43ebcda493da555cc01f013159eb7c211

    • SHA512

      9c14e65370330b7b9a3340422d20853d0f47f88b60d9e75752867bd59e8d30b75aebb5ca5db992fa3d7dda49328b8ce29656457868291a666c2404bb653ff6d7

    • SSDEEP

      768:Op22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:OpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks