General

  • Target

    cfa577a2db2ac4e4b92046ae859be2806fdb5d343c2a7fe88cb4d9f681dc5742N

  • Size

    34KB

  • Sample

    241010-3v6s7sycnp

  • MD5

    70bcf6a967bb9a92cf874c537cfbe370

  • SHA1

    a99ccd22430064090d460d56051cb30c13001047

  • SHA256

    cfa577a2db2ac4e4b92046ae859be2806fdb5d343c2a7fe88cb4d9f681dc5742

  • SHA512

    cb598d6c9b1c6d30f9c3399927ce7a6d25779d33669c1934d50889ce05fe0cb0abe1752f79fe975aa0716c5db5cbaac7b8e07b1ca8e12c34414ef53f069ca3c3

  • SSDEEP

    768:up22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:upYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      cfa577a2db2ac4e4b92046ae859be2806fdb5d343c2a7fe88cb4d9f681dc5742N

    • Size

      34KB

    • MD5

      70bcf6a967bb9a92cf874c537cfbe370

    • SHA1

      a99ccd22430064090d460d56051cb30c13001047

    • SHA256

      cfa577a2db2ac4e4b92046ae859be2806fdb5d343c2a7fe88cb4d9f681dc5742

    • SHA512

      cb598d6c9b1c6d30f9c3399927ce7a6d25779d33669c1934d50889ce05fe0cb0abe1752f79fe975aa0716c5db5cbaac7b8e07b1ca8e12c34414ef53f069ca3c3

    • SSDEEP

      768:up22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:upYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks