General

  • Target

    b5ceed871db266908b34a26159db6a5626971808eaa30a128401fbba2be8e690N

  • Size

    34KB

  • Sample

    241009-qnnmtszelf

  • MD5

    c55dd47c8a8fea1745d1588a6bee4330

  • SHA1

    097455ff415dd9f821d8fea30a5e475fb2d823a1

  • SHA256

    b5ceed871db266908b34a26159db6a5626971808eaa30a128401fbba2be8e690

  • SHA512

    92f505b4bbdcf6b85b6b58a92f3ad188a2f35c9c42fbbf6457aa2ed17a9dcf064cd63e0c21cb14a747e48d4ffa79aa1fc5d31bec323bf623972ac3b2ee2042e8

  • SSDEEP

    768:1p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:1pYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      b5ceed871db266908b34a26159db6a5626971808eaa30a128401fbba2be8e690N

    • Size

      34KB

    • MD5

      c55dd47c8a8fea1745d1588a6bee4330

    • SHA1

      097455ff415dd9f821d8fea30a5e475fb2d823a1

    • SHA256

      b5ceed871db266908b34a26159db6a5626971808eaa30a128401fbba2be8e690

    • SHA512

      92f505b4bbdcf6b85b6b58a92f3ad188a2f35c9c42fbbf6457aa2ed17a9dcf064cd63e0c21cb14a747e48d4ffa79aa1fc5d31bec323bf623972ac3b2ee2042e8

    • SSDEEP

      768:1p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:1pYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks