General

  • Target

    3ec8b57ea87348685214291f02db95e233f14e8591e2202012beaef2456bacf9

  • Size

    45KB

  • Sample

    241012-tyaqhatgmp

  • MD5

    9c34c5c813aafb68f29800ce7daf3da3

  • SHA1

    1a8a60b8dab0e708cf2155a7068d9b7c9e4efe1a

  • SHA256

    3ec8b57ea87348685214291f02db95e233f14e8591e2202012beaef2456bacf9

  • SHA512

    22382666adb94b34416176f8e87f3f3d3f08765f84d16744d2b0d4b7136aed35a2b54aed1ad9e190157d15b626e9d3f7efdacceb77007fc4e8ba851b9ac8d9c4

  • SSDEEP

    768:j2k/FQLPiwJiOH1Y/dEPUdnT9q6VL7S1COnIlhYQfC8lh9JV6dQmjt6VkgtH5nsO:j2ESHBidEPUBT97VMCXh44n5mjkVkC5P

Malware Config

Targets

    • Target

      223534841809356aa7c94f86e8b0f4d6b4ce317b8225b419b27a5ba320ab0b81.exe

    • Size

      110KB

    • MD5

      b471d5f706df69a4a28664d7e335a9da

    • SHA1

      995a757d4562d9f4e8231f359b4b78db2de1c1f0

    • SHA256

      223534841809356aa7c94f86e8b0f4d6b4ce317b8225b419b27a5ba320ab0b81

    • SHA512

      2bfeba6b8aec4caafd508644f08d3a70de469485c0c4e5220c231f024b5b48c9058896bdb55d5faccda6fad51402b6c10ffdbe8cc0612bebad81cd214c8238c3

    • SSDEEP

      1536:JiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:JiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks