General

  • Target

    ef90c8afec449279d3822573158805b71d37338a7e05f559dc7e38c809497f34N

  • Size

    89KB

  • Sample

    241009-pwybkaygne

  • MD5

    5d2e887c9450df07ea3b11e29bc30f80

  • SHA1

    edaab6acb2a6e766578e220ba59cc1b799cdc48f

  • SHA256

    ef90c8afec449279d3822573158805b71d37338a7e05f559dc7e38c809497f34

  • SHA512

    8086833eaf34dcddeb0f6b8150c7c0acc8184c1ca39c6c59da5b642084302a9b1cd8ecf1dcb5ba47615120e4552e129419c537addb145a62c05794c1c8e061c2

  • SSDEEP

    1536:v1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:N+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      ef90c8afec449279d3822573158805b71d37338a7e05f559dc7e38c809497f34N

    • Size

      89KB

    • MD5

      5d2e887c9450df07ea3b11e29bc30f80

    • SHA1

      edaab6acb2a6e766578e220ba59cc1b799cdc48f

    • SHA256

      ef90c8afec449279d3822573158805b71d37338a7e05f559dc7e38c809497f34

    • SHA512

      8086833eaf34dcddeb0f6b8150c7c0acc8184c1ca39c6c59da5b642084302a9b1cd8ecf1dcb5ba47615120e4552e129419c537addb145a62c05794c1c8e061c2

    • SSDEEP

      1536:v1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:N+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks