General

  • Target

    d12b242d0a43a98e196199befcffd5579c38055cb5b370e8211ca5525513776eN

  • Size

    160KB

  • Sample

    240922-ery27a1fla

  • MD5

    6a1f51b173a7d187e794627e82483000

  • SHA1

    2eefaebc3998f60eadcab9734f5bba72f09c7fa3

  • SHA256

    d12b242d0a43a98e196199befcffd5579c38055cb5b370e8211ca5525513776e

  • SHA512

    cd2dd870d9e4bde240b58285b9f229fed90c244f54e34dafd80cc9941a5256cb8c25dd61e2fb5a3f577d025f17434166667f6f564da656cd33017fa886fb93ba

  • SSDEEP

    1536:hEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:qY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      d12b242d0a43a98e196199befcffd5579c38055cb5b370e8211ca5525513776eN

    • Size

      160KB

    • MD5

      6a1f51b173a7d187e794627e82483000

    • SHA1

      2eefaebc3998f60eadcab9734f5bba72f09c7fa3

    • SHA256

      d12b242d0a43a98e196199befcffd5579c38055cb5b370e8211ca5525513776e

    • SHA512

      cd2dd870d9e4bde240b58285b9f229fed90c244f54e34dafd80cc9941a5256cb8c25dd61e2fb5a3f577d025f17434166667f6f564da656cd33017fa886fb93ba

    • SSDEEP

      1536:hEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:qY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks