General

  • Target

    4fd08aeebe7a94b02f13ad0fac7ba2e49bdd19de294b842d176ccf7401c58df0N

  • Size

    45KB

  • Sample

    240930-fm1kwstejb

  • MD5

    3bdc7eeb3be7d4bc7c22b90d50a17040

  • SHA1

    7600f860fe3408c3bb8f2aa70952acd3ff028516

  • SHA256

    4fd08aeebe7a94b02f13ad0fac7ba2e49bdd19de294b842d176ccf7401c58df0

  • SHA512

    12a1799b18b0ad1b6f935898f423974810f4f770c66aac80b5ec8f3062b031b61ad8b8cdf207964fa50382d145ffb464d1e9a1206d209ccfd879b30d8394f277

  • SSDEEP

    768:KhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:msWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      4fd08aeebe7a94b02f13ad0fac7ba2e49bdd19de294b842d176ccf7401c58df0N

    • Size

      45KB

    • MD5

      3bdc7eeb3be7d4bc7c22b90d50a17040

    • SHA1

      7600f860fe3408c3bb8f2aa70952acd3ff028516

    • SHA256

      4fd08aeebe7a94b02f13ad0fac7ba2e49bdd19de294b842d176ccf7401c58df0

    • SHA512

      12a1799b18b0ad1b6f935898f423974810f4f770c66aac80b5ec8f3062b031b61ad8b8cdf207964fa50382d145ffb464d1e9a1206d209ccfd879b30d8394f277

    • SSDEEP

      768:KhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:msWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks