General

  • Target

    8ea77a8f4b5afa86623b06585be0bdac519582b27d3484a193e5b54512c1d191N

  • Size

    34KB

  • Sample

    241018-3jmwysthjh

  • MD5

    3d1c0072bc928367c886585bdd0d9100

  • SHA1

    a5fc63993e479d21c4d0e65f7e6de300117613c8

  • SHA256

    8ea77a8f4b5afa86623b06585be0bdac519582b27d3484a193e5b54512c1d191

  • SHA512

    6c08ae8ad05650117b44e936342eb2d9c41b19473c9b9374e4c9c4e396b6e9f4fff57d406beae464d877b3077c3a10871a20712411231fa7e5c807e92aad1e0e

  • SSDEEP

    768:Xp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:XpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      8ea77a8f4b5afa86623b06585be0bdac519582b27d3484a193e5b54512c1d191N

    • Size

      34KB

    • MD5

      3d1c0072bc928367c886585bdd0d9100

    • SHA1

      a5fc63993e479d21c4d0e65f7e6de300117613c8

    • SHA256

      8ea77a8f4b5afa86623b06585be0bdac519582b27d3484a193e5b54512c1d191

    • SHA512

      6c08ae8ad05650117b44e936342eb2d9c41b19473c9b9374e4c9c4e396b6e9f4fff57d406beae464d877b3077c3a10871a20712411231fa7e5c807e92aad1e0e

    • SSDEEP

      768:Xp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:XpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks