General

  • Target

    94c367c99e02ec58e09b32e971fc9434e81c1544849c00cdd59946b95b0f6f1dN

  • Size

    34KB

  • Sample

    240918-v2m1nstgqq

  • MD5

    1b532945e65c06060ae4ec9a9e94dab0

  • SHA1

    039dc100ad1e9aac7bc1551540b9f85e906fd39c

  • SHA256

    94c367c99e02ec58e09b32e971fc9434e81c1544849c00cdd59946b95b0f6f1d

  • SHA512

    3f7eee730b79a88a30f1ed32b48a25f24514758fc3ae213bb4e253524bbb87e27f4d099d905f2d823ba2f8428e298522d36ae1603f8329946f25184114791bcc

  • SSDEEP

    768:Ap22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:ApYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      94c367c99e02ec58e09b32e971fc9434e81c1544849c00cdd59946b95b0f6f1dN

    • Size

      34KB

    • MD5

      1b532945e65c06060ae4ec9a9e94dab0

    • SHA1

      039dc100ad1e9aac7bc1551540b9f85e906fd39c

    • SHA256

      94c367c99e02ec58e09b32e971fc9434e81c1544849c00cdd59946b95b0f6f1d

    • SHA512

      3f7eee730b79a88a30f1ed32b48a25f24514758fc3ae213bb4e253524bbb87e27f4d099d905f2d823ba2f8428e298522d36ae1603f8329946f25184114791bcc

    • SSDEEP

      768:Ap22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:ApYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks