General

  • Target

    60456c175355c578e2dca37f65d8791dd27319abc35e8827d036012e8c7c108bN

  • Size

    160KB

  • Sample

    241005-hw8c7swdkf

  • MD5

    c86ccc23167e8d691d3ba5480fedf1f0

  • SHA1

    b8076577690a196c90a69cbb29959475a23d307d

  • SHA256

    60456c175355c578e2dca37f65d8791dd27319abc35e8827d036012e8c7c108b

  • SHA512

    7b1e7d39fe7783153c8073af21f18605e405f233b40c15266d8e94b891f1afe61ce1857744c950aa78353d0026538baaad4e3180c7d689a664320076ecd096f2

  • SSDEEP

    1536:TEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:QY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      60456c175355c578e2dca37f65d8791dd27319abc35e8827d036012e8c7c108bN

    • Size

      160KB

    • MD5

      c86ccc23167e8d691d3ba5480fedf1f0

    • SHA1

      b8076577690a196c90a69cbb29959475a23d307d

    • SHA256

      60456c175355c578e2dca37f65d8791dd27319abc35e8827d036012e8c7c108b

    • SHA512

      7b1e7d39fe7783153c8073af21f18605e405f233b40c15266d8e94b891f1afe61ce1857744c950aa78353d0026538baaad4e3180c7d689a664320076ecd096f2

    • SSDEEP

      1536:TEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:QY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks