General

  • Target

    3e02e36e201c55d2913888f69a29aa820dcdf957a9dced2064d151b3b544e044N

  • Size

    49KB

  • Sample

    240917-ha1fgayfrg

  • MD5

    891f8830b27137a3a7a0964c446e95e0

  • SHA1

    276c809e9d4e33970bfc1ab39eaec3982b634fdd

  • SHA256

    3e02e36e201c55d2913888f69a29aa820dcdf957a9dced2064d151b3b544e044

  • SHA512

    23ac163c86680337452bd191b175a1c629b2de78c84b63a86510a1ffef9c0cf21faeebbdecf858df3ba13e574f2d4baa3aa5fbf6fbb98ead85d4b83ac1e7a99b

  • SSDEEP

    1536:7OBLXNqgzf2v6b6NkXklZlogHGe9eBXW:7YLduv6OqXIlogmjW

Malware Config

Targets

    • Target

      3e02e36e201c55d2913888f69a29aa820dcdf957a9dced2064d151b3b544e044N

    • Size

      49KB

    • MD5

      891f8830b27137a3a7a0964c446e95e0

    • SHA1

      276c809e9d4e33970bfc1ab39eaec3982b634fdd

    • SHA256

      3e02e36e201c55d2913888f69a29aa820dcdf957a9dced2064d151b3b544e044

    • SHA512

      23ac163c86680337452bd191b175a1c629b2de78c84b63a86510a1ffef9c0cf21faeebbdecf858df3ba13e574f2d4baa3aa5fbf6fbb98ead85d4b83ac1e7a99b

    • SSDEEP

      1536:7OBLXNqgzf2v6b6NkXklZlogHGe9eBXW:7YLduv6OqXIlogmjW

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks