General

  • Target

    164edc0a1410db5fad0cc16e42f8b8b1db685ec6d704c577484fa4f8e2cd0814N

  • Size

    160KB

  • Sample

    240930-awxmpssejg

  • MD5

    fc61c5bae78e746e76b80d925305ea20

  • SHA1

    3f3b14e9e0f89a5f0563deeb82a2c5237dddf280

  • SHA256

    164edc0a1410db5fad0cc16e42f8b8b1db685ec6d704c577484fa4f8e2cd0814

  • SHA512

    5075bf261666ce18935a246e82474a5cafd2a08924f215fd71b7a7f389c6fda5be118cf9b20122088d7bb949ccc5bea132658258766c2f409081dda14b1b4dc2

  • SSDEEP

    1536:5EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:yY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      164edc0a1410db5fad0cc16e42f8b8b1db685ec6d704c577484fa4f8e2cd0814N

    • Size

      160KB

    • MD5

      fc61c5bae78e746e76b80d925305ea20

    • SHA1

      3f3b14e9e0f89a5f0563deeb82a2c5237dddf280

    • SHA256

      164edc0a1410db5fad0cc16e42f8b8b1db685ec6d704c577484fa4f8e2cd0814

    • SHA512

      5075bf261666ce18935a246e82474a5cafd2a08924f215fd71b7a7f389c6fda5be118cf9b20122088d7bb949ccc5bea132658258766c2f409081dda14b1b4dc2

    • SSDEEP

      1536:5EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:yY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks