General

  • Target

    6efc190c2a630d5a662fdf87678aae50N

  • Size

    45KB

  • Sample

    240911-kjayaa1ekj

  • MD5

    6efc190c2a630d5a662fdf87678aae50

  • SHA1

    6574931f6934898e86cc0e49d0c9356b9ed3c6cd

  • SHA256

    04217eb1abe5ef5babccc6e7c0a5014585147696213b74a48f340957f82141d8

  • SHA512

    765fca77e76f48a1198cb100dab167725ed113540299c70250883d18bb60dcb70007b2afc009294fd03695cc56c99006671eed553641cad2997c399d9cc175d6

  • SSDEEP

    768:YhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:ksWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      6efc190c2a630d5a662fdf87678aae50N

    • Size

      45KB

    • MD5

      6efc190c2a630d5a662fdf87678aae50

    • SHA1

      6574931f6934898e86cc0e49d0c9356b9ed3c6cd

    • SHA256

      04217eb1abe5ef5babccc6e7c0a5014585147696213b74a48f340957f82141d8

    • SHA512

      765fca77e76f48a1198cb100dab167725ed113540299c70250883d18bb60dcb70007b2afc009294fd03695cc56c99006671eed553641cad2997c399d9cc175d6

    • SSDEEP

      768:YhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:ksWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks