General

  • Target

    f2241e3dae6b9a5025a244723b66f6b896b649dd362d6f411c742f98678bc8e9N

  • Size

    45KB

  • Sample

    241012-xjtfvawbra

  • MD5

    8a1984c3993c4f64f666743bdeb082d0

  • SHA1

    902db774d71d3abc7fc36d616aaf17353c12dbab

  • SHA256

    f2241e3dae6b9a5025a244723b66f6b896b649dd362d6f411c742f98678bc8e9

  • SHA512

    11a07e2f4507cc610ec7caa05044f1e497e88a7229f0b25d78b3963786ade675b4213a3243a80aca90f3f308b20ff6166cb830883decdca8d5a8cb31b5d52f73

  • SSDEEP

    768:DhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:VsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      f2241e3dae6b9a5025a244723b66f6b896b649dd362d6f411c742f98678bc8e9N

    • Size

      45KB

    • MD5

      8a1984c3993c4f64f666743bdeb082d0

    • SHA1

      902db774d71d3abc7fc36d616aaf17353c12dbab

    • SHA256

      f2241e3dae6b9a5025a244723b66f6b896b649dd362d6f411c742f98678bc8e9

    • SHA512

      11a07e2f4507cc610ec7caa05044f1e497e88a7229f0b25d78b3963786ade675b4213a3243a80aca90f3f308b20ff6166cb830883decdca8d5a8cb31b5d52f73

    • SSDEEP

      768:DhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:VsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks