General

  • Target

    52a4b2ebdf27c8847ee73696fb7bd893ecdff3e861f196c34cb5d78b5caa1e30N

  • Size

    110KB

  • Sample

    241001-e5cq4svcqh

  • MD5

    7aa183fd3022abfafcb4e3528ba75750

  • SHA1

    428a528fe721af5487f7f9c791a2bdc58451b529

  • SHA256

    52a4b2ebdf27c8847ee73696fb7bd893ecdff3e861f196c34cb5d78b5caa1e30

  • SHA512

    c129b37812d2c5325e5f25225812da521c01bca785033f8284d76e084c55393f86be721f804364a8b159b19a80bc32534f55fe4dda8120fed859b9ff340d5452

  • SSDEEP

    1536:uiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:uiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      52a4b2ebdf27c8847ee73696fb7bd893ecdff3e861f196c34cb5d78b5caa1e30N

    • Size

      110KB

    • MD5

      7aa183fd3022abfafcb4e3528ba75750

    • SHA1

      428a528fe721af5487f7f9c791a2bdc58451b529

    • SHA256

      52a4b2ebdf27c8847ee73696fb7bd893ecdff3e861f196c34cb5d78b5caa1e30

    • SHA512

      c129b37812d2c5325e5f25225812da521c01bca785033f8284d76e084c55393f86be721f804364a8b159b19a80bc32534f55fe4dda8120fed859b9ff340d5452

    • SSDEEP

      1536:uiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:uiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks