General

  • Target

    b77cbd6722c0606122c6982840cf581d2927fc1154e8c6db9cd3d4320c5c15bdN

  • Size

    34KB

  • Sample

    241002-rtq6ksvdka

  • MD5

    5796498ff0aa1c72bba24ab99ac2e2e0

  • SHA1

    ec998b97bab9259f2fe9ca7aae9210f4f4ac3fcb

  • SHA256

    b77cbd6722c0606122c6982840cf581d2927fc1154e8c6db9cd3d4320c5c15bd

  • SHA512

    7af38229c487c6bfb3452bb3d04152909a51a4fc6e75443dc42d7b9cfa31e8ace24f5b9b843cda3151e27ecead1c5f80f24f2d3db9fe71b49f8c6cdcbef4f9bf

  • SSDEEP

    768:Up22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:UpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      b77cbd6722c0606122c6982840cf581d2927fc1154e8c6db9cd3d4320c5c15bdN

    • Size

      34KB

    • MD5

      5796498ff0aa1c72bba24ab99ac2e2e0

    • SHA1

      ec998b97bab9259f2fe9ca7aae9210f4f4ac3fcb

    • SHA256

      b77cbd6722c0606122c6982840cf581d2927fc1154e8c6db9cd3d4320c5c15bd

    • SHA512

      7af38229c487c6bfb3452bb3d04152909a51a4fc6e75443dc42d7b9cfa31e8ace24f5b9b843cda3151e27ecead1c5f80f24f2d3db9fe71b49f8c6cdcbef4f9bf

    • SSDEEP

      768:Up22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:UpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks