General

  • Target

    fbd6a8358c28cb298ddb28564de34c6d3f705726030f558950cd643d5e442b15

  • Size

    92KB

  • Sample

    221127-ra4mkace36

  • MD5

    af6b7a625180212b77f38fc7550dee40

  • SHA1

    f3ec6978a4c3f9183c66550a612929f97068bba5

  • SHA256

    fbd6a8358c28cb298ddb28564de34c6d3f705726030f558950cd643d5e442b15

  • SHA512

    c9f8fd8c6652dea63b14f336eeffc2b5c888f43e7ab9d8fd336a2f5d549f264f1f9b6f81d0e6c2a83031311c5ef178bb6648e7b6e461c9c117966147a35a1b83

  • SSDEEP

    1536:pLTjavDj/fNRep5Y5pBpPdEBKfMsjRl7uucRrp:pM5RepK5pBK+Cb

Malware Config

Targets

    • Target

      fbd6a8358c28cb298ddb28564de34c6d3f705726030f558950cd643d5e442b15

    • Size

      92KB

    • MD5

      af6b7a625180212b77f38fc7550dee40

    • SHA1

      f3ec6978a4c3f9183c66550a612929f97068bba5

    • SHA256

      fbd6a8358c28cb298ddb28564de34c6d3f705726030f558950cd643d5e442b15

    • SHA512

      c9f8fd8c6652dea63b14f336eeffc2b5c888f43e7ab9d8fd336a2f5d549f264f1f9b6f81d0e6c2a83031311c5ef178bb6648e7b6e461c9c117966147a35a1b83

    • SSDEEP

      1536:pLTjavDj/fNRep5Y5pBpPdEBKfMsjRl7uucRrp:pM5RepK5pBK+Cb

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks