General

  • Target

    3bb69de69f170e1c2f665b98f9d834245eaa650ab5f4ac072c29609d6ece3231N

  • Size

    34KB

  • Sample

    241022-x1fajssekq

  • MD5

    3232614179fac9e22c5a978eb7578510

  • SHA1

    c30d05f58be7d51f8fec994d19771f599c79c0e3

  • SHA256

    3bb69de69f170e1c2f665b98f9d834245eaa650ab5f4ac072c29609d6ece3231

  • SHA512

    b045131582810b76f4f7fbbc9ed11a210c0528e100e85c5a6928ff25a997ac56b1eca539e4d905c6ce869317bb9460fae5785c11bb1b7740e2961c2b61435824

  • SSDEEP

    768:yp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:ypYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      3bb69de69f170e1c2f665b98f9d834245eaa650ab5f4ac072c29609d6ece3231N

    • Size

      34KB

    • MD5

      3232614179fac9e22c5a978eb7578510

    • SHA1

      c30d05f58be7d51f8fec994d19771f599c79c0e3

    • SHA256

      3bb69de69f170e1c2f665b98f9d834245eaa650ab5f4ac072c29609d6ece3231

    • SHA512

      b045131582810b76f4f7fbbc9ed11a210c0528e100e85c5a6928ff25a997ac56b1eca539e4d905c6ce869317bb9460fae5785c11bb1b7740e2961c2b61435824

    • SSDEEP

      768:yp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:ypYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks