General

  • Target

    ac07d55a1f0dc7290545d00f37bef324106cc013dac808baf5185e244448d698

  • Size

    110KB

  • Sample

    241023-c7dp3syfql

  • MD5

    26e4879486cc14a877b111f6df411ce5

  • SHA1

    79494868e696bb2b59b2380d863d0c96ad3616a5

  • SHA256

    ac07d55a1f0dc7290545d00f37bef324106cc013dac808baf5185e244448d698

  • SHA512

    0ca8b185087dd9fe4d7dbb553a2b5dd9a0c4d82eab1eb1c34b7f15f4c033c95821270e507c08cb2661a0d5e6aae947c2f92c1bfbe19c648789832e4ca389c180

  • SSDEEP

    1536:liLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:liyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      ac07d55a1f0dc7290545d00f37bef324106cc013dac808baf5185e244448d698

    • Size

      110KB

    • MD5

      26e4879486cc14a877b111f6df411ce5

    • SHA1

      79494868e696bb2b59b2380d863d0c96ad3616a5

    • SHA256

      ac07d55a1f0dc7290545d00f37bef324106cc013dac808baf5185e244448d698

    • SHA512

      0ca8b185087dd9fe4d7dbb553a2b5dd9a0c4d82eab1eb1c34b7f15f4c033c95821270e507c08cb2661a0d5e6aae947c2f92c1bfbe19c648789832e4ca389c180

    • SSDEEP

      1536:liLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:liyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks