General

  • Target

    5a0d0b546c1e8e59b629d86cef710402cc7778c4982a7d3d0d3a7a8aff835742N

  • Size

    34KB

  • Sample

    240928-c8mdlsvhkf

  • MD5

    7555eb773944d72c1532f152f184fe60

  • SHA1

    e2a1abeb460f099561062fc4acfa0121d1d3c0f7

  • SHA256

    5a0d0b546c1e8e59b629d86cef710402cc7778c4982a7d3d0d3a7a8aff835742

  • SHA512

    0899c410eea3e327bd9a255a6f554480e3c52c776bc8c7c6b7163b6c3ac6ff5d013952453e29338f978637d49eeeb2e52fb511ff0307bf5f3ed45f68dfaffa6c

  • SSDEEP

    768:+p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:+pYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      5a0d0b546c1e8e59b629d86cef710402cc7778c4982a7d3d0d3a7a8aff835742N

    • Size

      34KB

    • MD5

      7555eb773944d72c1532f152f184fe60

    • SHA1

      e2a1abeb460f099561062fc4acfa0121d1d3c0f7

    • SHA256

      5a0d0b546c1e8e59b629d86cef710402cc7778c4982a7d3d0d3a7a8aff835742

    • SHA512

      0899c410eea3e327bd9a255a6f554480e3c52c776bc8c7c6b7163b6c3ac6ff5d013952453e29338f978637d49eeeb2e52fb511ff0307bf5f3ed45f68dfaffa6c

    • SSDEEP

      768:+p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:+pYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks