General

  • Target

    b285f77259a0146163db13e21f0031eb74b2c57e780d471369c666de265d73f8N.exe

  • Size

    110KB

  • Sample

    240926-bq6tvsyenm

  • MD5

    311379909b71293bcd76dcbfa328b4f0

  • SHA1

    e2a301daba2d00e0ea487337326c3937c233963d

  • SHA256

    b285f77259a0146163db13e21f0031eb74b2c57e780d471369c666de265d73f8

  • SHA512

    2496b6791d60ca7919504185ec6eee72fa936c58ea3379144529d18d3ee8950e04d1af968cef2b22c9249562ae64093665a48cd4f54ce95c69f3b8ca3f013221

  • SSDEEP

    1536:JiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:JiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      b285f77259a0146163db13e21f0031eb74b2c57e780d471369c666de265d73f8N.exe

    • Size

      110KB

    • MD5

      311379909b71293bcd76dcbfa328b4f0

    • SHA1

      e2a301daba2d00e0ea487337326c3937c233963d

    • SHA256

      b285f77259a0146163db13e21f0031eb74b2c57e780d471369c666de265d73f8

    • SHA512

      2496b6791d60ca7919504185ec6eee72fa936c58ea3379144529d18d3ee8950e04d1af968cef2b22c9249562ae64093665a48cd4f54ce95c69f3b8ca3f013221

    • SSDEEP

      1536:JiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:JiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks