General

  • Target

    656b8f5a0b8d1b296b0eeaa1f81d4bca87a6b02501157a39732e7d2624fa443bN

  • Size

    34KB

  • Sample

    241006-y4zzssyamg

  • MD5

    d3877b5f9e9a8b8d956ddedbfe8ecac0

  • SHA1

    292535a591db2cf37f9492f1ad3c437b7e077cbc

  • SHA256

    656b8f5a0b8d1b296b0eeaa1f81d4bca87a6b02501157a39732e7d2624fa443b

  • SHA512

    37301a4bb9689cb5bdd66c046c335fdf14b71b1da980f09614d781aad9816f63faa61ccdcb19e4987e6f41dbe1cfe91abbbcd914ad7eb05ff52d1581eae1c696

  • SSDEEP

    768:Zp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:ZpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      656b8f5a0b8d1b296b0eeaa1f81d4bca87a6b02501157a39732e7d2624fa443bN

    • Size

      34KB

    • MD5

      d3877b5f9e9a8b8d956ddedbfe8ecac0

    • SHA1

      292535a591db2cf37f9492f1ad3c437b7e077cbc

    • SHA256

      656b8f5a0b8d1b296b0eeaa1f81d4bca87a6b02501157a39732e7d2624fa443b

    • SHA512

      37301a4bb9689cb5bdd66c046c335fdf14b71b1da980f09614d781aad9816f63faa61ccdcb19e4987e6f41dbe1cfe91abbbcd914ad7eb05ff52d1581eae1c696

    • SSDEEP

      768:Zp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:ZpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks