General

  • Target

    e26fe918e50c3dacbcb9458cccb7aaa0N

  • Size

    45KB

  • Sample

    240912-sxe36a1fra

  • MD5

    e26fe918e50c3dacbcb9458cccb7aaa0

  • SHA1

    c917cf14fe950164c37e281db193d5c9bd0666b8

  • SHA256

    e9ab46c55104051892dbe2da071c11ed21371b9b77a5cf4450223e52b58207f8

  • SHA512

    9ba0cf828e11d371f0e69ccdf22b43c9dd9384111291c491d74745c047e567dc5869a8f42511f3a230b1f748e441b5b1356ad6c674c3fcf3f6d87260a4b83ea5

  • SSDEEP

    768:HhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:BsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      e26fe918e50c3dacbcb9458cccb7aaa0N

    • Size

      45KB

    • MD5

      e26fe918e50c3dacbcb9458cccb7aaa0

    • SHA1

      c917cf14fe950164c37e281db193d5c9bd0666b8

    • SHA256

      e9ab46c55104051892dbe2da071c11ed21371b9b77a5cf4450223e52b58207f8

    • SHA512

      9ba0cf828e11d371f0e69ccdf22b43c9dd9384111291c491d74745c047e567dc5869a8f42511f3a230b1f748e441b5b1356ad6c674c3fcf3f6d87260a4b83ea5

    • SSDEEP

      768:HhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:BsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks