General

  • Target

    af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0

  • Size

    62KB

  • Sample

    241201-cracqaxrcl

  • MD5

    7bc905e9818fdc4db4aaf1f672d4ac6c

  • SHA1

    efa7e31c68031bb6d9f7b67107567ef022f154ee

  • SHA256

    af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0

  • SHA512

    f3be7a2dd70a881e5c845e34221ecde8d130460a6634e776cd27e512ea3fb5604ebd3b5aa65a698fd07f07e89c2a894b84f656e0b304fe883ddb13b69cfafabe

  • SSDEEP

    768:7BpZR8fRR1EOrsKrbcYXn9UdDp7Esezzvmw1dJxWxU5:7BPSJRBrsKrbc4WdDp76zLB0u

Malware Config

Targets

    • Target

      af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0

    • Size

      62KB

    • MD5

      7bc905e9818fdc4db4aaf1f672d4ac6c

    • SHA1

      efa7e31c68031bb6d9f7b67107567ef022f154ee

    • SHA256

      af94321f5c88e3b76a7f2daaa55c268a5262130542efcb540f1bc24e0c31f5f0

    • SHA512

      f3be7a2dd70a881e5c845e34221ecde8d130460a6634e776cd27e512ea3fb5604ebd3b5aa65a698fd07f07e89c2a894b84f656e0b304fe883ddb13b69cfafabe

    • SSDEEP

      768:7BpZR8fRR1EOrsKrbcYXn9UdDp7Esezzvmw1dJxWxU5:7BPSJRBrsKrbc4WdDp76zLB0u

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks