General

  • Target

    828fb497a6b500ee04e15445908e7480N.exe

  • Size

    34KB

  • Sample

    240915-ab39ravblq

  • MD5

    828fb497a6b500ee04e15445908e7480

  • SHA1

    5d1239d3cfcec6f0794abd6f7e66fb62149ad565

  • SHA256

    993de1c6ae11fd1e0ad4ecf74da5029eaf43a069a6d4d8c8d3abb413accd03c3

  • SHA512

    13dd7175bd900437191503f5c848a759a07c5914d026fd737c7307dc285c0be1e53a7bad422603077fc14bf6a3b6c7c06b95cd7daeb9088dd7b6a698a0680443

  • SSDEEP

    768:rp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:rpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      828fb497a6b500ee04e15445908e7480N.exe

    • Size

      34KB

    • MD5

      828fb497a6b500ee04e15445908e7480

    • SHA1

      5d1239d3cfcec6f0794abd6f7e66fb62149ad565

    • SHA256

      993de1c6ae11fd1e0ad4ecf74da5029eaf43a069a6d4d8c8d3abb413accd03c3

    • SHA512

      13dd7175bd900437191503f5c848a759a07c5914d026fd737c7307dc285c0be1e53a7bad422603077fc14bf6a3b6c7c06b95cd7daeb9088dd7b6a698a0680443

    • SSDEEP

      768:rp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:rpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks