General

  • Target

    9cef71133a35c36b2f849e088862941a7f5edb8d4384577e495d4276482fefa2

  • Size

    45KB

  • Sample

    240929-n2lz2stbpp

  • MD5

    04037a3c5502f91f42fd80cd60a552f4

  • SHA1

    22ab11a10d2e43c8b4ab20b1c3884fccc813ec5a

  • SHA256

    9cef71133a35c36b2f849e088862941a7f5edb8d4384577e495d4276482fefa2

  • SHA512

    0b4b6369705372f95d02d6cb91f40802e1eba0252fba98f118a1bfa976263ce7539863589b8e07947b2b1c3fc0782d30ca9ce63d9a34e9f13b10838f6503572a

  • SSDEEP

    768:GhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:KsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      9cef71133a35c36b2f849e088862941a7f5edb8d4384577e495d4276482fefa2

    • Size

      45KB

    • MD5

      04037a3c5502f91f42fd80cd60a552f4

    • SHA1

      22ab11a10d2e43c8b4ab20b1c3884fccc813ec5a

    • SHA256

      9cef71133a35c36b2f849e088862941a7f5edb8d4384577e495d4276482fefa2

    • SHA512

      0b4b6369705372f95d02d6cb91f40802e1eba0252fba98f118a1bfa976263ce7539863589b8e07947b2b1c3fc0782d30ca9ce63d9a34e9f13b10838f6503572a

    • SSDEEP

      768:GhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:KsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks