General

  • Target

    778448d02265d1b7abbfbea05f871d5212799f168bbdcf5e998846bde991bc22N

  • Size

    110KB

  • Sample

    241001-m5e58szemb

  • MD5

    37fb2d0e1c9580ada94871d2cae65b20

  • SHA1

    f53012ac97759026bc0640fb4046b4ef6d973cc3

  • SHA256

    778448d02265d1b7abbfbea05f871d5212799f168bbdcf5e998846bde991bc22

  • SHA512

    cc2741ce97a2a54c5459826ded5c6ea6f2197be89bb69513dd4b5e47aad2e510c816e045dfa2943190982047f7ad1fe128642825b1c48492fa5d015ca900244c

  • SSDEEP

    1536:JiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:JiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      778448d02265d1b7abbfbea05f871d5212799f168bbdcf5e998846bde991bc22N

    • Size

      110KB

    • MD5

      37fb2d0e1c9580ada94871d2cae65b20

    • SHA1

      f53012ac97759026bc0640fb4046b4ef6d973cc3

    • SHA256

      778448d02265d1b7abbfbea05f871d5212799f168bbdcf5e998846bde991bc22

    • SHA512

      cc2741ce97a2a54c5459826ded5c6ea6f2197be89bb69513dd4b5e47aad2e510c816e045dfa2943190982047f7ad1fe128642825b1c48492fa5d015ca900244c

    • SSDEEP

      1536:JiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:JiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks