General

  • Target

    d096de6f0e3f9d893647fcfed40202f7f0f9b70577a8baf531ce136fc16af552N

  • Size

    34KB

  • Sample

    241007-n4hqeaxgjh

  • MD5

    ab02d5794c30c5b3ff780845e747b300

  • SHA1

    81f3c77585189deb4204a0334f2858e906abc5e7

  • SHA256

    d096de6f0e3f9d893647fcfed40202f7f0f9b70577a8baf531ce136fc16af552

  • SHA512

    45937043a325f2045278c994a453e4f852cc9e445cb4048d4e680443fb52cdc6fbfab0e2c77c18ce1ef52bd7d4210056a030d10963ffc26ba8c08d5295d10b77

  • SSDEEP

    768:jp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:jpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      d096de6f0e3f9d893647fcfed40202f7f0f9b70577a8baf531ce136fc16af552N

    • Size

      34KB

    • MD5

      ab02d5794c30c5b3ff780845e747b300

    • SHA1

      81f3c77585189deb4204a0334f2858e906abc5e7

    • SHA256

      d096de6f0e3f9d893647fcfed40202f7f0f9b70577a8baf531ce136fc16af552

    • SHA512

      45937043a325f2045278c994a453e4f852cc9e445cb4048d4e680443fb52cdc6fbfab0e2c77c18ce1ef52bd7d4210056a030d10963ffc26ba8c08d5295d10b77

    • SSDEEP

      768:jp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:jpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks