General

  • Target

    5b4e7fac0f183de47e375b28895fba563a8d5bbc3e21104e7e68b26a852cd18dN

  • Size

    89KB

  • Sample

    241022-twelnswenn

  • MD5

    7fd8d0ec77dd1bf4a3544fd4c0fa54a0

  • SHA1

    fd8b43fa43690c6a5b5235a0534c37f70e1f96fa

  • SHA256

    5b4e7fac0f183de47e375b28895fba563a8d5bbc3e21104e7e68b26a852cd18d

  • SHA512

    c7aac66ac77c8485f08373ec199c7bcd5fb7ebf6345c1cd4aad52c377739e1504fdc3b7bb86540c693ef99ef8ece278fcf67ecb3e072ac6aad5e8671078c36b0

  • SSDEEP

    1536:R1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:7+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      5b4e7fac0f183de47e375b28895fba563a8d5bbc3e21104e7e68b26a852cd18dN

    • Size

      89KB

    • MD5

      7fd8d0ec77dd1bf4a3544fd4c0fa54a0

    • SHA1

      fd8b43fa43690c6a5b5235a0534c37f70e1f96fa

    • SHA256

      5b4e7fac0f183de47e375b28895fba563a8d5bbc3e21104e7e68b26a852cd18d

    • SHA512

      c7aac66ac77c8485f08373ec199c7bcd5fb7ebf6345c1cd4aad52c377739e1504fdc3b7bb86540c693ef99ef8ece278fcf67ecb3e072ac6aad5e8671078c36b0

    • SSDEEP

      1536:R1+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:7+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks