General

  • Target

    4ea193bce4d8cc584db7d42b9c0d1d088865842583c3b5c68e3b748952dc8106N

  • Size

    58KB

  • Sample

    241023-prfkyszfkd

  • MD5

    1bcb38aa9caed15258d151953ff593e0

  • SHA1

    1e47effef8de3efebc2f835cd319c2860eb7a0cd

  • SHA256

    4ea193bce4d8cc584db7d42b9c0d1d088865842583c3b5c68e3b748952dc8106

  • SHA512

    b0e8dd80e42794bc96f3dd3dedcd699f1c8de1a2a34d9c7fe6f38900a88525d1bfe24d6a21f38aa5f0b5fcc10831eb375b9ec3dbc50a83fb7911ca7a83a0d360

  • SSDEEP

    768:+M5WaKyBevI8OHKA+hmXid6Z9HUEMyerTAzwavKCFC/nGVykmBdwxkpNZsP:95P2vIg7dNrTAzZv3FaGU5LRm

Malware Config

Targets

    • Target

      4ea193bce4d8cc584db7d42b9c0d1d088865842583c3b5c68e3b748952dc8106N

    • Size

      58KB

    • MD5

      1bcb38aa9caed15258d151953ff593e0

    • SHA1

      1e47effef8de3efebc2f835cd319c2860eb7a0cd

    • SHA256

      4ea193bce4d8cc584db7d42b9c0d1d088865842583c3b5c68e3b748952dc8106

    • SHA512

      b0e8dd80e42794bc96f3dd3dedcd699f1c8de1a2a34d9c7fe6f38900a88525d1bfe24d6a21f38aa5f0b5fcc10831eb375b9ec3dbc50a83fb7911ca7a83a0d360

    • SSDEEP

      768:+M5WaKyBevI8OHKA+hmXid6Z9HUEMyerTAzwavKCFC/nGVykmBdwxkpNZsP:95P2vIg7dNrTAzZv3FaGU5LRm

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks