General

  • Target

    b34d18e71435a44f7ee49f29b4136380N.exe

  • Size

    160KB

  • Sample

    240910-n6bpwavcla

  • MD5

    b34d18e71435a44f7ee49f29b4136380

  • SHA1

    dc814069e4f70b650717e96b1c367a9e704b6fba

  • SHA256

    c93311566788191d2b0d8e69e0e2d8f33115ffee54dd8fe74ec88c3c9ef67b09

  • SHA512

    c655ea2d9ad29e7e07e2233e3d08a4d27b5dd2f833997bb6327429ac3129859f2eb7dd34ad275645327959bbae4d2e114cf8a3c9310c7a9f292e47069ac77214

  • SSDEEP

    1536:tEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:GY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      b34d18e71435a44f7ee49f29b4136380N.exe

    • Size

      160KB

    • MD5

      b34d18e71435a44f7ee49f29b4136380

    • SHA1

      dc814069e4f70b650717e96b1c367a9e704b6fba

    • SHA256

      c93311566788191d2b0d8e69e0e2d8f33115ffee54dd8fe74ec88c3c9ef67b09

    • SHA512

      c655ea2d9ad29e7e07e2233e3d08a4d27b5dd2f833997bb6327429ac3129859f2eb7dd34ad275645327959bbae4d2e114cf8a3c9310c7a9f292e47069ac77214

    • SSDEEP

      1536:tEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:GY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks