General

  • Target

    dfef0ae5742587850de5c9e963223110N

  • Size

    45KB

  • Sample

    240910-fd47qaxdnj

  • MD5

    dfef0ae5742587850de5c9e963223110

  • SHA1

    0a32c1abf7cc4a179aa0a1defdfe5176555aba97

  • SHA256

    c9bc57dd415dc8354bd543a40cbb5949e1e66f434c287d2fb09a79bd13955f7d

  • SHA512

    bc200d5c5085b4760b950424a128c43b1f9d70a2a67a834bdda68aed7362f0574b18298e1ca9813417ec7bd70be23cb448ba89a037729fecca3ff3799e19bd9d

  • SSDEEP

    768:ZhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:DsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      dfef0ae5742587850de5c9e963223110N

    • Size

      45KB

    • MD5

      dfef0ae5742587850de5c9e963223110

    • SHA1

      0a32c1abf7cc4a179aa0a1defdfe5176555aba97

    • SHA256

      c9bc57dd415dc8354bd543a40cbb5949e1e66f434c287d2fb09a79bd13955f7d

    • SHA512

      bc200d5c5085b4760b950424a128c43b1f9d70a2a67a834bdda68aed7362f0574b18298e1ca9813417ec7bd70be23cb448ba89a037729fecca3ff3799e19bd9d

    • SSDEEP

      768:ZhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:DsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks