General

  • Target

    873e4b55cc6393f6ab527445d2cd230f4dbcaded95bc344153cdde6ca674e54dN.exe

  • Size

    34KB

  • Sample

    240926-dvgfwavbpj

  • MD5

    69798172046b83e89fd43fecacc63670

  • SHA1

    2e97b503179def1bbfeac37fad66b1d66486d149

  • SHA256

    873e4b55cc6393f6ab527445d2cd230f4dbcaded95bc344153cdde6ca674e54d

  • SHA512

    ff70785dde7edc9693b70fe002a16323717be184b3b61aae6279cb36aa7365e6ed721ce55ae0922239ed7c7b03ef55fef423243e730621b71d71dcd86a8bf2e2

  • SSDEEP

    768:ip22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:ipYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      873e4b55cc6393f6ab527445d2cd230f4dbcaded95bc344153cdde6ca674e54dN.exe

    • Size

      34KB

    • MD5

      69798172046b83e89fd43fecacc63670

    • SHA1

      2e97b503179def1bbfeac37fad66b1d66486d149

    • SHA256

      873e4b55cc6393f6ab527445d2cd230f4dbcaded95bc344153cdde6ca674e54d

    • SHA512

      ff70785dde7edc9693b70fe002a16323717be184b3b61aae6279cb36aa7365e6ed721ce55ae0922239ed7c7b03ef55fef423243e730621b71d71dcd86a8bf2e2

    • SSDEEP

      768:ip22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:ipYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks