General

  • Target

    03c8ff5d11b59ca4e306ebf51d1e97a5cef9efb71789279ea3f13d78d691d957N.exe

  • Size

    49KB

  • Sample

    240926-mhgqjssbqr

  • MD5

    affd6670982bb140891a330b9ae74bb0

  • SHA1

    8e804a130f44f5f5c02900955e976c257c7cd2a1

  • SHA256

    03c8ff5d11b59ca4e306ebf51d1e97a5cef9efb71789279ea3f13d78d691d957

  • SHA512

    5f618612ce1374fd5a9aafa613b012d9f659eae55c4cfb6e4fb5036b173b381ceab9edfe9a6d38fe9741c8ee94ffe167bcedc6d891d7d54d059eb1d768fdcdfc

  • SSDEEP

    1536:5OBLXNqgzf2v6b6NkXklZlogHGe9eBXW:5YLduv6OqXIlogmjW

Malware Config

Targets

    • Target

      03c8ff5d11b59ca4e306ebf51d1e97a5cef9efb71789279ea3f13d78d691d957N.exe

    • Size

      49KB

    • MD5

      affd6670982bb140891a330b9ae74bb0

    • SHA1

      8e804a130f44f5f5c02900955e976c257c7cd2a1

    • SHA256

      03c8ff5d11b59ca4e306ebf51d1e97a5cef9efb71789279ea3f13d78d691d957

    • SHA512

      5f618612ce1374fd5a9aafa613b012d9f659eae55c4cfb6e4fb5036b173b381ceab9edfe9a6d38fe9741c8ee94ffe167bcedc6d891d7d54d059eb1d768fdcdfc

    • SSDEEP

      1536:5OBLXNqgzf2v6b6NkXklZlogHGe9eBXW:5YLduv6OqXIlogmjW

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks