General

  • Target

    e1633eb8b8a6ac2fe16710d8f7fc3c40N

  • Size

    34KB

  • Sample

    240911-axyldssgrp

  • MD5

    e1633eb8b8a6ac2fe16710d8f7fc3c40

  • SHA1

    92a128058cceb37aac12b6fe29fdf5d88f248d9d

  • SHA256

    ba2b1567667714ec6291568d2296c71d49c891231cae6819b23d2b26e29b2590

  • SHA512

    4faeb8a4bf37853b6d24bcedc0cf19e79d179f2d6aea2b0694cc2f2b42576081e31b253f4d17557996c8214a33e3ab628c1e5dc5d86b4b44bc818f0cb91b26db

  • SSDEEP

    768:qp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:qpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      e1633eb8b8a6ac2fe16710d8f7fc3c40N

    • Size

      34KB

    • MD5

      e1633eb8b8a6ac2fe16710d8f7fc3c40

    • SHA1

      92a128058cceb37aac12b6fe29fdf5d88f248d9d

    • SHA256

      ba2b1567667714ec6291568d2296c71d49c891231cae6819b23d2b26e29b2590

    • SHA512

      4faeb8a4bf37853b6d24bcedc0cf19e79d179f2d6aea2b0694cc2f2b42576081e31b253f4d17557996c8214a33e3ab628c1e5dc5d86b4b44bc818f0cb91b26db

    • SSDEEP

      768:qp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:qpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks