General

  • Target

    40858f59e4ca2af8362a54a5d4bdb4edb5f2dc498749939cdb1946efe4de89e3N

  • Size

    34KB

  • Sample

    241017-xkzdgstblq

  • MD5

    3a37eb3bfa0fb83f0cee627699113510

  • SHA1

    fbb0380479b8185365ea6d406dddce81a8223946

  • SHA256

    40858f59e4ca2af8362a54a5d4bdb4edb5f2dc498749939cdb1946efe4de89e3

  • SHA512

    3fd8f1bf6ec4c4ebd322d08a295f641218e91b4e4d67cc3784a47631fd3fe117814be79572b77e00f0d2fea83b8616a6049e2280ede31adafd1fac13464d0038

  • SSDEEP

    768:bp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:bpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      40858f59e4ca2af8362a54a5d4bdb4edb5f2dc498749939cdb1946efe4de89e3N

    • Size

      34KB

    • MD5

      3a37eb3bfa0fb83f0cee627699113510

    • SHA1

      fbb0380479b8185365ea6d406dddce81a8223946

    • SHA256

      40858f59e4ca2af8362a54a5d4bdb4edb5f2dc498749939cdb1946efe4de89e3

    • SHA512

      3fd8f1bf6ec4c4ebd322d08a295f641218e91b4e4d67cc3784a47631fd3fe117814be79572b77e00f0d2fea83b8616a6049e2280ede31adafd1fac13464d0038

    • SSDEEP

      768:bp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:bpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks