General

  • Target

    63f4f56664c43f9174747515bc85cf53058779f007b313dec2a8f3363f480a3cN

  • Size

    45KB

  • Sample

    241018-jdvj3avcle

  • MD5

    82fd1ce49dc76b1592a0dde3b970dae0

  • SHA1

    b9a4cb7723696adc45bb1556583f0940289a5aec

  • SHA256

    63f4f56664c43f9174747515bc85cf53058779f007b313dec2a8f3363f480a3c

  • SHA512

    270d900786c42b81baa6943e3565b8e04b7d3f1395a6f6e4795b7333258928a9fe9160872ea2da4e5052c4bc28fb675791f35fe83ae30e7409650e0d76dbf459

  • SSDEEP

    768:NhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:vsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

Malware Config

Targets

    • Target

      63f4f56664c43f9174747515bc85cf53058779f007b313dec2a8f3363f480a3cN

    • Size

      45KB

    • MD5

      82fd1ce49dc76b1592a0dde3b970dae0

    • SHA1

      b9a4cb7723696adc45bb1556583f0940289a5aec

    • SHA256

      63f4f56664c43f9174747515bc85cf53058779f007b313dec2a8f3363f480a3c

    • SHA512

      270d900786c42b81baa6943e3565b8e04b7d3f1395a6f6e4795b7333258928a9fe9160872ea2da4e5052c4bc28fb675791f35fe83ae30e7409650e0d76dbf459

    • SSDEEP

      768:NhP0kDE9N5dCA8J7VHXdrIniQaBTT+QQ+r1n4K8+C9TtIuCjaqUODvJVQ2f:vsWE9N5dFu53dsniQaB/xZ14n7zIF+qr

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks