General

  • Target

    703de1f8c58504b368f1f460f7a340ff25795a89c235c8951d748898636d08a5

  • Size

    110KB

  • Sample

    241004-x2cwtawdpa

  • MD5

    1a7466ca78ac174c5a5671c7be5c41fc

  • SHA1

    1feefd05814f8460b88e1c3a04ddfa90ca3efe87

  • SHA256

    703de1f8c58504b368f1f460f7a340ff25795a89c235c8951d748898636d08a5

  • SHA512

    6f5a18df78ede8a0607184dfcf7d9042439d937acf56268ba77d2f749184c993d5d8f31e6ad4f82f1d5b3016fd396efca6908256ca9f0ab2f4b4fc81ffdf1b7f

  • SSDEEP

    1536:kiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:kiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      703de1f8c58504b368f1f460f7a340ff25795a89c235c8951d748898636d08a5

    • Size

      110KB

    • MD5

      1a7466ca78ac174c5a5671c7be5c41fc

    • SHA1

      1feefd05814f8460b88e1c3a04ddfa90ca3efe87

    • SHA256

      703de1f8c58504b368f1f460f7a340ff25795a89c235c8951d748898636d08a5

    • SHA512

      6f5a18df78ede8a0607184dfcf7d9042439d937acf56268ba77d2f749184c993d5d8f31e6ad4f82f1d5b3016fd396efca6908256ca9f0ab2f4b4fc81ffdf1b7f

    • SSDEEP

      1536:kiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:kiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks