General

  • Target

    362f7d507c924ae9d34ef2a247e58335483196747be80b3057ef72815065a7f5N

  • Size

    34KB

  • Sample

    240923-fpclvawfra

  • MD5

    f78b114a10c5aec2b1f72e2e84b34c30

  • SHA1

    eb2c107f5bc0d3ef0c758149a39cdeb706f4bf29

  • SHA256

    362f7d507c924ae9d34ef2a247e58335483196747be80b3057ef72815065a7f5

  • SHA512

    bf693669105e2fae71465395c263101bf3ed84682ff73e85d603c5d24c108a722ade8e50a4b60742b4d89b1d8e8ba260e1c7ac01e1a90bd356db1a35a62f953c

  • SSDEEP

    768:mp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:mpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      362f7d507c924ae9d34ef2a247e58335483196747be80b3057ef72815065a7f5N

    • Size

      34KB

    • MD5

      f78b114a10c5aec2b1f72e2e84b34c30

    • SHA1

      eb2c107f5bc0d3ef0c758149a39cdeb706f4bf29

    • SHA256

      362f7d507c924ae9d34ef2a247e58335483196747be80b3057ef72815065a7f5

    • SHA512

      bf693669105e2fae71465395c263101bf3ed84682ff73e85d603c5d24c108a722ade8e50a4b60742b4d89b1d8e8ba260e1c7ac01e1a90bd356db1a35a62f953c

    • SSDEEP

      768:mp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:mpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks