General

  • Target

    fda5bea3f52c3d84600f69678ac4b30bb6eeaf64068693509100b7bff1dcce60N

  • Size

    110KB

  • Sample

    241023-jxfj9a1dml

  • MD5

    ecd58cf8ec6d848a41989120a0332c70

  • SHA1

    dd4e2aa0c64b057d9eff7029d5a803cdd4deef87

  • SHA256

    fda5bea3f52c3d84600f69678ac4b30bb6eeaf64068693509100b7bff1dcce60

  • SHA512

    6dd3d5ef17e5e4187a17952d373d292eb7c9b01c76f6f2c4e376b4824d959cccb4490ec083d11065efd020abda025ba1edab4194aabefdb7c28f9c5ae7b95076

  • SSDEEP

    1536:KiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:KiyvRmDLs/ZrwWJjAqGcRJ2hg

Malware Config

Targets

    • Target

      fda5bea3f52c3d84600f69678ac4b30bb6eeaf64068693509100b7bff1dcce60N

    • Size

      110KB

    • MD5

      ecd58cf8ec6d848a41989120a0332c70

    • SHA1

      dd4e2aa0c64b057d9eff7029d5a803cdd4deef87

    • SHA256

      fda5bea3f52c3d84600f69678ac4b30bb6eeaf64068693509100b7bff1dcce60

    • SHA512

      6dd3d5ef17e5e4187a17952d373d292eb7c9b01c76f6f2c4e376b4824d959cccb4490ec083d11065efd020abda025ba1edab4194aabefdb7c28f9c5ae7b95076

    • SSDEEP

      1536:KiLOvRmmQegJfBbmAQ256/ZrwWnwqjhurmKFcxL8JQ2r0Eg:KiyvRmDLs/ZrwWJjAqGcRJ2hg

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks