General

  • Target

    6c7ca572606961f212fdc41ce73617d9e3c2cff300b40f10ccf37f9df6f26c95N

  • Size

    160KB

  • Sample

    240918-sw1ngayhnr

  • MD5

    dd6b4f1747fd60bc6bd42517410cfde0

  • SHA1

    ca0850c763963f97a8ae8c867e7c0a0c1e320bf7

  • SHA256

    6c7ca572606961f212fdc41ce73617d9e3c2cff300b40f10ccf37f9df6f26c95

  • SHA512

    de406a9761051624bb159f6b99bc86be54de3e556e8e9df793fed4c96df2d8383448805f85912e6439e06c1bfd9ab9645dd14406f7ebe837cabf43444d00dae6

  • SSDEEP

    1536:WEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:9Y+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      6c7ca572606961f212fdc41ce73617d9e3c2cff300b40f10ccf37f9df6f26c95N

    • Size

      160KB

    • MD5

      dd6b4f1747fd60bc6bd42517410cfde0

    • SHA1

      ca0850c763963f97a8ae8c867e7c0a0c1e320bf7

    • SHA256

      6c7ca572606961f212fdc41ce73617d9e3c2cff300b40f10ccf37f9df6f26c95

    • SHA512

      de406a9761051624bb159f6b99bc86be54de3e556e8e9df793fed4c96df2d8383448805f85912e6439e06c1bfd9ab9645dd14406f7ebe837cabf43444d00dae6

    • SSDEEP

      1536:WEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:9Y+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks