General

  • Target

    d2182e2e022edb5fd9319c82f7d322f78070ff22dc48e18350b6d18b35d4269aN

  • Size

    58KB

  • Sample

    241103-g7v2ksxfkp

  • MD5

    a05e790741f78a10789cc24c113a87a0

  • SHA1

    effd9251f1786b3307c98bcf09f156684649d245

  • SHA256

    d2182e2e022edb5fd9319c82f7d322f78070ff22dc48e18350b6d18b35d4269a

  • SHA512

    dffe9e4907091112f63faafb58360caca6ce286e689fa2c5a994290ceec83f1385e331bb555ed7569eb5f17710d8b17c832c97de049a3599e028aa6e865129e3

  • SSDEEP

    768:lM5WaKyBevI8OHKA+hmXid6Z9HUEMyerTAzwavKCFC/nGVykmBdwxkpNZsP:m5P2vIg7dNrTAzZv3FaGU5LRm

Malware Config

Targets

    • Target

      d2182e2e022edb5fd9319c82f7d322f78070ff22dc48e18350b6d18b35d4269aN

    • Size

      58KB

    • MD5

      a05e790741f78a10789cc24c113a87a0

    • SHA1

      effd9251f1786b3307c98bcf09f156684649d245

    • SHA256

      d2182e2e022edb5fd9319c82f7d322f78070ff22dc48e18350b6d18b35d4269a

    • SHA512

      dffe9e4907091112f63faafb58360caca6ce286e689fa2c5a994290ceec83f1385e331bb555ed7569eb5f17710d8b17c832c97de049a3599e028aa6e865129e3

    • SSDEEP

      768:lM5WaKyBevI8OHKA+hmXid6Z9HUEMyerTAzwavKCFC/nGVykmBdwxkpNZsP:m5P2vIg7dNrTAzZv3FaGU5LRm

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks