General

  • Target

    573aa59f4854c37ee70601f6a0b0be2c5955151591f4f56e41fc56d4e8c95604

  • Size

    160KB

  • Sample

    240919-zlgk6szfmp

  • MD5

    9c2c3c400d2826eea9499f2f68ecb87c

  • SHA1

    54f5003b4a6323906e347b8f04b5bc2bdbc4f979

  • SHA256

    573aa59f4854c37ee70601f6a0b0be2c5955151591f4f56e41fc56d4e8c95604

  • SHA512

    76f3accb55e230f0639daf296e5ed7690f1f5a36505221145e0a7a2d242d6e0893e2e084fdbeb69e1763fcfb86a7b59df9ba5ff817db338ad36e9c54fb699473

  • SSDEEP

    1536:SEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:ZY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      573aa59f4854c37ee70601f6a0b0be2c5955151591f4f56e41fc56d4e8c95604

    • Size

      160KB

    • MD5

      9c2c3c400d2826eea9499f2f68ecb87c

    • SHA1

      54f5003b4a6323906e347b8f04b5bc2bdbc4f979

    • SHA256

      573aa59f4854c37ee70601f6a0b0be2c5955151591f4f56e41fc56d4e8c95604

    • SHA512

      76f3accb55e230f0639daf296e5ed7690f1f5a36505221145e0a7a2d242d6e0893e2e084fdbeb69e1763fcfb86a7b59df9ba5ff817db338ad36e9c54fb699473

    • SSDEEP

      1536:SEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:ZY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks