General

  • Target

    c7447d7f2a2eb0127ac16c54c7a30679b35296631dc2cce9e06d807bb43a1127

  • Size

    110KB

  • Sample

    241019-dfezhavglj

  • MD5

    8e14510583990034a19a5083eb5878ae

  • SHA1

    1b56941c0741ff57060b14495298e40bcd51f331

  • SHA256

    c7447d7f2a2eb0127ac16c54c7a30679b35296631dc2cce9e06d807bb43a1127

  • SHA512

    ce6f75cf3f1b52418ade86909d27fa30196c7c4e80b3a9bfd6ed673e2b755444f4343475aefceb23618a3044601999fffdc5deb5e3c7a1e0262a923c918b8b7c

  • SSDEEP

    1536:/iLOvRmmQegJgBbmAQ256/ZrwWnwqjhurmKFcxL8JQ28SGd:/iyvRmeLs/ZrwWJjAqGcRJ2xS

Malware Config

Targets

    • Target

      c7447d7f2a2eb0127ac16c54c7a30679b35296631dc2cce9e06d807bb43a1127

    • Size

      110KB

    • MD5

      8e14510583990034a19a5083eb5878ae

    • SHA1

      1b56941c0741ff57060b14495298e40bcd51f331

    • SHA256

      c7447d7f2a2eb0127ac16c54c7a30679b35296631dc2cce9e06d807bb43a1127

    • SHA512

      ce6f75cf3f1b52418ade86909d27fa30196c7c4e80b3a9bfd6ed673e2b755444f4343475aefceb23618a3044601999fffdc5deb5e3c7a1e0262a923c918b8b7c

    • SSDEEP

      1536:/iLOvRmmQegJgBbmAQ256/ZrwWnwqjhurmKFcxL8JQ28SGd:/iyvRmeLs/ZrwWJjAqGcRJ2xS

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks