General

  • Target

    d9e1f9c1647adaef25e845102458a830d46727c500cb84b4b3b88a7b1e84e2fbN

  • Size

    34KB

  • Sample

    241009-gcgkpsyanb

  • MD5

    d9e7c6bcdad8647ac78b0ad183d85480

  • SHA1

    c7237ecd60c6e0ec036c5e47fbeacafad933adaa

  • SHA256

    d9e1f9c1647adaef25e845102458a830d46727c500cb84b4b3b88a7b1e84e2fb

  • SHA512

    4cec0b3aa208b7ce5ced0bc04c30dafe62a76bb75c4795392768007394b8a623e53ed78adc6e3510f2a2826b1f62fde1dfc8b238fcf4a5cf7b27d8c3c74ca986

  • SSDEEP

    768:gp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:gpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      d9e1f9c1647adaef25e845102458a830d46727c500cb84b4b3b88a7b1e84e2fbN

    • Size

      34KB

    • MD5

      d9e7c6bcdad8647ac78b0ad183d85480

    • SHA1

      c7237ecd60c6e0ec036c5e47fbeacafad933adaa

    • SHA256

      d9e1f9c1647adaef25e845102458a830d46727c500cb84b4b3b88a7b1e84e2fb

    • SHA512

      4cec0b3aa208b7ce5ced0bc04c30dafe62a76bb75c4795392768007394b8a623e53ed78adc6e3510f2a2826b1f62fde1dfc8b238fcf4a5cf7b27d8c3c74ca986

    • SSDEEP

      768:gp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:gpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks