General

  • Target

    099d54eb5372bb43e106e7f5d439a75aef56b7890e099d03ae8423bd5c37e793N

  • Size

    160KB

  • Sample

    240922-wdngzascqn

  • MD5

    303bf25192a72366070f7ce4564c5920

  • SHA1

    4ea37220b6cf26ab39d89a0d2639fb53f2ea1348

  • SHA256

    099d54eb5372bb43e106e7f5d439a75aef56b7890e099d03ae8423bd5c37e793

  • SHA512

    3082f2cdd8ec3bbd107e21831be3c75b4f48ba2146c15c68e6d5fe5f1b14508e45aa13302bb2af5e052915ee893f8d18faa9d6ae75175c99023c97f5bb7355c1

  • SSDEEP

    1536:REY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:aY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      099d54eb5372bb43e106e7f5d439a75aef56b7890e099d03ae8423bd5c37e793N

    • Size

      160KB

    • MD5

      303bf25192a72366070f7ce4564c5920

    • SHA1

      4ea37220b6cf26ab39d89a0d2639fb53f2ea1348

    • SHA256

      099d54eb5372bb43e106e7f5d439a75aef56b7890e099d03ae8423bd5c37e793

    • SHA512

      3082f2cdd8ec3bbd107e21831be3c75b4f48ba2146c15c68e6d5fe5f1b14508e45aa13302bb2af5e052915ee893f8d18faa9d6ae75175c99023c97f5bb7355c1

    • SSDEEP

      1536:REY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:aY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks