General

  • Target

    78c432bc6c1739ccf338cd389d69bdf89d58d2b2c70fcdad9170d53e9ce1dcfdN

  • Size

    34KB

  • Sample

    241019-xee3natfln

  • MD5

    459b0bfaf266b0d0744288b59f6c9c50

  • SHA1

    4bd76ca90fe28f15f0fb42a9551901f9b9c982e8

  • SHA256

    78c432bc6c1739ccf338cd389d69bdf89d58d2b2c70fcdad9170d53e9ce1dcfd

  • SHA512

    badf56fec5dbcf4cf7b870b6284b32d620e04398a10d33902b1eeb2928086014fc6103c556e0e7e59751dfb4eb1ef43935f3329a5c09e4d399bb78d0f1d8e899

  • SSDEEP

    768:3p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:3pYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      78c432bc6c1739ccf338cd389d69bdf89d58d2b2c70fcdad9170d53e9ce1dcfdN

    • Size

      34KB

    • MD5

      459b0bfaf266b0d0744288b59f6c9c50

    • SHA1

      4bd76ca90fe28f15f0fb42a9551901f9b9c982e8

    • SHA256

      78c432bc6c1739ccf338cd389d69bdf89d58d2b2c70fcdad9170d53e9ce1dcfd

    • SHA512

      badf56fec5dbcf4cf7b870b6284b32d620e04398a10d33902b1eeb2928086014fc6103c556e0e7e59751dfb4eb1ef43935f3329a5c09e4d399bb78d0f1d8e899

    • SSDEEP

      768:3p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:3pYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks