General

  • Target

    ba23cf628b7650dbfe38b3274e9e185fb592f6bb41df6de7dadd8915ae604041

  • Size

    58KB

  • Sample

    241028-egmw6sxnbp

  • MD5

    b8590487e7ff6483fb65772f35bc95e6

  • SHA1

    fa8556ac91d786007e9803d6d4ccb897cba9306a

  • SHA256

    ba23cf628b7650dbfe38b3274e9e185fb592f6bb41df6de7dadd8915ae604041

  • SHA512

    47fb05c41397064fafc85232da42c2200b739664dbd2bd53cd7a931ebf91710e2b745a630ede12de660cc951c97801ad3d5e8e1d0afa550bab72985db9b927a5

  • SSDEEP

    768:WM5WaKyBevI8OHKA+hmXid6Z9HUEMyerTAzwavKCFC/nGVykmBdwxkpNZsP:V5P2vIg7dNrTAzZv3FaGU5LRm

Malware Config

Targets

    • Target

      ba23cf628b7650dbfe38b3274e9e185fb592f6bb41df6de7dadd8915ae604041

    • Size

      58KB

    • MD5

      b8590487e7ff6483fb65772f35bc95e6

    • SHA1

      fa8556ac91d786007e9803d6d4ccb897cba9306a

    • SHA256

      ba23cf628b7650dbfe38b3274e9e185fb592f6bb41df6de7dadd8915ae604041

    • SHA512

      47fb05c41397064fafc85232da42c2200b739664dbd2bd53cd7a931ebf91710e2b745a630ede12de660cc951c97801ad3d5e8e1d0afa550bab72985db9b927a5

    • SSDEEP

      768:WM5WaKyBevI8OHKA+hmXid6Z9HUEMyerTAzwavKCFC/nGVykmBdwxkpNZsP:V5P2vIg7dNrTAzZv3FaGU5LRm

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks