General

  • Target

    09acfae624529c84dc7b521048b9dc27dea871c5be003088b21b73c07be1491eN

  • Size

    89KB

  • Sample

    240923-hq8f1syblg

  • MD5

    3cd3a51a7bee286679616131d477e560

  • SHA1

    fe0bd6da7657f0b4c26a5b7a8ff31a5a457f6ad0

  • SHA256

    09acfae624529c84dc7b521048b9dc27dea871c5be003088b21b73c07be1491e

  • SHA512

    2693a61df58102846364d5769c7d14bbb1b61b7be81ff7ca7e074f9c46036fa2ca25f3ad6b263609dcead118f723360a243f62f42a08b23b095c1565872550ad

  • SSDEEP

    1536:D1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:p+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      09acfae624529c84dc7b521048b9dc27dea871c5be003088b21b73c07be1491eN

    • Size

      89KB

    • MD5

      3cd3a51a7bee286679616131d477e560

    • SHA1

      fe0bd6da7657f0b4c26a5b7a8ff31a5a457f6ad0

    • SHA256

      09acfae624529c84dc7b521048b9dc27dea871c5be003088b21b73c07be1491e

    • SHA512

      2693a61df58102846364d5769c7d14bbb1b61b7be81ff7ca7e074f9c46036fa2ca25f3ad6b263609dcead118f723360a243f62f42a08b23b095c1565872550ad

    • SSDEEP

      1536:D1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:p+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks