General

  • Target

    967cb8aef0dc565b6a8d6933270ad710N

  • Size

    45KB

  • Sample

    240914-e86hlaxbjj

  • MD5

    967cb8aef0dc565b6a8d6933270ad710

  • SHA1

    a01cbc83118379e325647d188ddd23fadcd7c237

  • SHA256

    94edb2dd4de928a03c2c224cf16575dd65bf5da9344cf8e3ed546461fcee1052

  • SHA512

    e21cec1e1223477a5f4398ed9920832748bf8fed3c6d381f195d91a4e7b0b8fab56a230f009fc2499df6afeecd766c5d5deb2dfdd969ddee26ec6422c1ddfd8c

  • SSDEEP

    768:0hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:4sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      967cb8aef0dc565b6a8d6933270ad710N

    • Size

      45KB

    • MD5

      967cb8aef0dc565b6a8d6933270ad710

    • SHA1

      a01cbc83118379e325647d188ddd23fadcd7c237

    • SHA256

      94edb2dd4de928a03c2c224cf16575dd65bf5da9344cf8e3ed546461fcee1052

    • SHA512

      e21cec1e1223477a5f4398ed9920832748bf8fed3c6d381f195d91a4e7b0b8fab56a230f009fc2499df6afeecd766c5d5deb2dfdd969ddee26ec6422c1ddfd8c

    • SSDEEP

      768:0hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:4sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks