General

  • Target

    5156c46a75424fe58b6f120445dd703c3fa349bc64003ac727ee9f44ab0de552N

  • Size

    164KB

  • Sample

    241110-l46fcsvbnl

  • MD5

    99253e52818cc1159a712dd95be38870

  • SHA1

    e4bc9f7c20088b9d885ddbf906cfa76788356bb3

  • SHA256

    5156c46a75424fe58b6f120445dd703c3fa349bc64003ac727ee9f44ab0de552

  • SHA512

    b565d7f1b7555cb08ae9199386b4ec3b79365144022a726b84fe0c3c0d25872de54da179169aa25d4c0220db660d422bf540a2be1084f4dfd36922ac7549beab

  • SSDEEP

    3072:kBLOSC0BiaynVRNNFwaSNDe1Fclgr+0StmnJza3yD/CLO:/SC0Bf8wve1FbRWmYi4O

Malware Config

Targets

    • Target

      5156c46a75424fe58b6f120445dd703c3fa349bc64003ac727ee9f44ab0de552N

    • Size

      164KB

    • MD5

      99253e52818cc1159a712dd95be38870

    • SHA1

      e4bc9f7c20088b9d885ddbf906cfa76788356bb3

    • SHA256

      5156c46a75424fe58b6f120445dd703c3fa349bc64003ac727ee9f44ab0de552

    • SHA512

      b565d7f1b7555cb08ae9199386b4ec3b79365144022a726b84fe0c3c0d25872de54da179169aa25d4c0220db660d422bf540a2be1084f4dfd36922ac7549beab

    • SSDEEP

      3072:kBLOSC0BiaynVRNNFwaSNDe1Fclgr+0StmnJza3yD/CLO:/SC0Bf8wve1FbRWmYi4O

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks