General

  • Target

    f821a34ac3ecac67ef5a7a73e4d3007ea9de6095e99480837c66860e64e034caN

  • Size

    34KB

  • Sample

    240920-yx3r4svhrc

  • MD5

    def73e0c17db0db42815ef3c1a2abc80

  • SHA1

    77b17eaf08f9921594099d891a3221e2adadb372

  • SHA256

    f821a34ac3ecac67ef5a7a73e4d3007ea9de6095e99480837c66860e64e034ca

  • SHA512

    fdfcc87c769965969451dd40ed79d16af6557b2109091f20d99211a70ad5f0965e781051b865cb618fbdb84f72e23a47daa6bd4fd03e822fe49c758271070bc0

  • SSDEEP

    768:Np22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:NpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      f821a34ac3ecac67ef5a7a73e4d3007ea9de6095e99480837c66860e64e034caN

    • Size

      34KB

    • MD5

      def73e0c17db0db42815ef3c1a2abc80

    • SHA1

      77b17eaf08f9921594099d891a3221e2adadb372

    • SHA256

      f821a34ac3ecac67ef5a7a73e4d3007ea9de6095e99480837c66860e64e034ca

    • SHA512

      fdfcc87c769965969451dd40ed79d16af6557b2109091f20d99211a70ad5f0965e781051b865cb618fbdb84f72e23a47daa6bd4fd03e822fe49c758271070bc0

    • SSDEEP

      768:Np22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:NpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks