General

  • Target

    ffd281b898fc740b46ebd2b034a3eaf0N

  • Size

    45KB

  • Sample

    240914-ndwjks1gnh

  • MD5

    ffd281b898fc740b46ebd2b034a3eaf0

  • SHA1

    902c6d713247e9bc4e7adbfb0bedaa1c11a57921

  • SHA256

    db80626d9f8614aec40e47472d9b025bfa0e0838cc37264898f2eac908522b4a

  • SHA512

    61a1f98bf8303bb9b254d3e3d65eae196b318c5d9b00313f58c4793dc39e0483b2e864f3f0f45f0aa54cf56a3ab0aae89e0a953f896d17ebaab44fe3314619aa

  • SSDEEP

    768:fhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:JsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      ffd281b898fc740b46ebd2b034a3eaf0N

    • Size

      45KB

    • MD5

      ffd281b898fc740b46ebd2b034a3eaf0

    • SHA1

      902c6d713247e9bc4e7adbfb0bedaa1c11a57921

    • SHA256

      db80626d9f8614aec40e47472d9b025bfa0e0838cc37264898f2eac908522b4a

    • SHA512

      61a1f98bf8303bb9b254d3e3d65eae196b318c5d9b00313f58c4793dc39e0483b2e864f3f0f45f0aa54cf56a3ab0aae89e0a953f896d17ebaab44fe3314619aa

    • SSDEEP

      768:fhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:JsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks