General

  • Target

    7add9c871c2e5d9a480e9bcb880aa065440fc4628de3ea1ab2c56bda4ba5df9b

  • Size

    160KB

  • Sample

    240928-3glk4s1bnr

  • MD5

    2f3a09f88d8375359a2cf213f120596a

  • SHA1

    f2f08aebbaba7cf5236b6c5cc7f9940459b27b5d

  • SHA256

    7add9c871c2e5d9a480e9bcb880aa065440fc4628de3ea1ab2c56bda4ba5df9b

  • SHA512

    53dd2f227b516d5a632eb2afd283f84c902575d1ccfd0bc10f21875b046b665cbcf173e9f5fbb504b704e2e85dad06b93491431f2ab1a6d4600d8781a5d08301

  • SSDEEP

    1536:2EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:dY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      7add9c871c2e5d9a480e9bcb880aa065440fc4628de3ea1ab2c56bda4ba5df9b

    • Size

      160KB

    • MD5

      2f3a09f88d8375359a2cf213f120596a

    • SHA1

      f2f08aebbaba7cf5236b6c5cc7f9940459b27b5d

    • SHA256

      7add9c871c2e5d9a480e9bcb880aa065440fc4628de3ea1ab2c56bda4ba5df9b

    • SHA512

      53dd2f227b516d5a632eb2afd283f84c902575d1ccfd0bc10f21875b046b665cbcf173e9f5fbb504b704e2e85dad06b93491431f2ab1a6d4600d8781a5d08301

    • SSDEEP

      1536:2EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:dY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks