General

  • Target

    95a90f809ac5ffe339d96af679ad6e70N

  • Size

    45KB

  • Sample

    240914-w3b58sycln

  • MD5

    95a90f809ac5ffe339d96af679ad6e70

  • SHA1

    fedf9d3a0da22bb0a3ec0fb07a6db785d874889a

  • SHA256

    5dd374389770bf494bb24eb7ebcf6566eeebf4bc70178f2cf64176752b1ab503

  • SHA512

    f5930b9a0be47e74ddcf23c5666861e04f411f71d5fceb1513ea54088b7efa8bc3a78ffc944e0f5db35a175f9e0153e73d27d0d8753ada20b83902333344bd65

  • SSDEEP

    768:IhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:0sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      95a90f809ac5ffe339d96af679ad6e70N

    • Size

      45KB

    • MD5

      95a90f809ac5ffe339d96af679ad6e70

    • SHA1

      fedf9d3a0da22bb0a3ec0fb07a6db785d874889a

    • SHA256

      5dd374389770bf494bb24eb7ebcf6566eeebf4bc70178f2cf64176752b1ab503

    • SHA512

      f5930b9a0be47e74ddcf23c5666861e04f411f71d5fceb1513ea54088b7efa8bc3a78ffc944e0f5db35a175f9e0153e73d27d0d8753ada20b83902333344bd65

    • SSDEEP

      768:IhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:0sWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks