General

  • Target

    cfe485833053624d6674042b552cd310N

  • Size

    34KB

  • Sample

    240914-2h7z3a1bqb

  • MD5

    cfe485833053624d6674042b552cd310

  • SHA1

    50430536b6b2cbe668b62ada6a38818769971379

  • SHA256

    960bfe1b7bf393c752b3fb85b07946a45225885b877fd70db02f9131f8e37b9d

  • SHA512

    fa1036b53576be7e8db999ad03807e0714f5c99647dd6412dc8e95755bcb1aa3794e19481524fae9dea0eabf261dd4fa038e84cf580713cb624211c78421be8f

  • SSDEEP

    768:qmp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:jpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      cfe485833053624d6674042b552cd310N

    • Size

      34KB

    • MD5

      cfe485833053624d6674042b552cd310

    • SHA1

      50430536b6b2cbe668b62ada6a38818769971379

    • SHA256

      960bfe1b7bf393c752b3fb85b07946a45225885b877fd70db02f9131f8e37b9d

    • SHA512

      fa1036b53576be7e8db999ad03807e0714f5c99647dd6412dc8e95755bcb1aa3794e19481524fae9dea0eabf261dd4fa038e84cf580713cb624211c78421be8f

    • SSDEEP

      768:qmp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:jpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks