General

  • Target

    71df8712dcffb97924958e8021d1877f94890e4817961ec74b79c20decccbf77N

  • Size

    45KB

  • Sample

    241006-brdjpstanc

  • MD5

    d5e6f80349e5bf68296fe4d4ec3259a0

  • SHA1

    54020e6fceab645f0be0c3d6a4bad3ac6d9e1da4

  • SHA256

    71df8712dcffb97924958e8021d1877f94890e4817961ec74b79c20decccbf77

  • SHA512

    dc872764e0d424cc9d80d43a6e58e3a1a9bd122f9e91f1eea0af08f1a7301be4e1f815d34f6c815c4fc213d11d7675255e93cfa54cf0bac9897bf6311fd32a7f

  • SSDEEP

    768:4hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:EsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      71df8712dcffb97924958e8021d1877f94890e4817961ec74b79c20decccbf77N

    • Size

      45KB

    • MD5

      d5e6f80349e5bf68296fe4d4ec3259a0

    • SHA1

      54020e6fceab645f0be0c3d6a4bad3ac6d9e1da4

    • SHA256

      71df8712dcffb97924958e8021d1877f94890e4817961ec74b79c20decccbf77

    • SHA512

      dc872764e0d424cc9d80d43a6e58e3a1a9bd122f9e91f1eea0af08f1a7301be4e1f815d34f6c815c4fc213d11d7675255e93cfa54cf0bac9897bf6311fd32a7f

    • SSDEEP

      768:4hP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:EsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks