General

  • Target

    65f0fc08353a2b7235ca90b709b14e10N.exe

  • Size

    160KB

  • Sample

    240909-vpczyazcnr

  • MD5

    65f0fc08353a2b7235ca90b709b14e10

  • SHA1

    b1926a1b7060e5145f5d20f7dc6a262810eb1f7f

  • SHA256

    86218f57202543cf67991e36400adc7cd7050fbb67e7037c748799f211121450

  • SHA512

    b23557e59c9bc9f3e4b47ca0489754a4a28dd911585ed449c341f220e8c54478033079ed3253463d7c1dfc96633aa91cd3102a281100fadd288a1253717b3b2d

  • SSDEEP

    1536:EEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:3Y+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      65f0fc08353a2b7235ca90b709b14e10N.exe

    • Size

      160KB

    • MD5

      65f0fc08353a2b7235ca90b709b14e10

    • SHA1

      b1926a1b7060e5145f5d20f7dc6a262810eb1f7f

    • SHA256

      86218f57202543cf67991e36400adc7cd7050fbb67e7037c748799f211121450

    • SHA512

      b23557e59c9bc9f3e4b47ca0489754a4a28dd911585ed449c341f220e8c54478033079ed3253463d7c1dfc96633aa91cd3102a281100fadd288a1253717b3b2d

    • SSDEEP

      1536:EEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:3Y+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks