General

  • Target

    9fed89f3e07b9b3e64084732512a266ed5578b7f70798ad09ae6b598774b1f01N

  • Size

    110KB

  • Sample

    240930-f5xa7atgpe

  • MD5

    8fb53e1bee5245dc46c66363b8863570

  • SHA1

    5c760d9e6dd5396374bebab6b944b8018c26cca8

  • SHA256

    9fed89f3e07b9b3e64084732512a266ed5578b7f70798ad09ae6b598774b1f01

  • SHA512

    3f3210566e0be969dabf7ba02bbac1b8355bbb6b6181fea7334ecbac53c9aaf58cd3edbc3a62ff23a694347a297d79118073150003157060ec0edf183353186b

  • SSDEEP

    1536:eiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:eiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      9fed89f3e07b9b3e64084732512a266ed5578b7f70798ad09ae6b598774b1f01N

    • Size

      110KB

    • MD5

      8fb53e1bee5245dc46c66363b8863570

    • SHA1

      5c760d9e6dd5396374bebab6b944b8018c26cca8

    • SHA256

      9fed89f3e07b9b3e64084732512a266ed5578b7f70798ad09ae6b598774b1f01

    • SHA512

      3f3210566e0be969dabf7ba02bbac1b8355bbb6b6181fea7334ecbac53c9aaf58cd3edbc3a62ff23a694347a297d79118073150003157060ec0edf183353186b

    • SSDEEP

      1536:eiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:eiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks