General

  • Target

    8b6f78b7eeefb77e5d7ad15cfb47f79b58eb7bb48a1eeb0819014a54502e7167

  • Size

    152KB

  • Sample

    241230-bcvjnssnbn

  • MD5

    3ae3584f0b9fce0c2321a41e985bea79

  • SHA1

    0fe8abf2884e853a735e93b46bb533109d35c7c2

  • SHA256

    8b6f78b7eeefb77e5d7ad15cfb47f79b58eb7bb48a1eeb0819014a54502e7167

  • SHA512

    49f158f5ce2e309cf70c1b1988e01adc44a515c4a3fd776e9bf28dcb669336aea72910d5b44447e3d1a5ed1665f0aa23f52915c289400a9bcb2bc38cce79fe83

  • SSDEEP

    1536:W6myQm5x9jSp42U/35fK6q+vMoGMaK9aWLwbOB0QQiz:rn3Wy2w5fK6tvFt9aW+Ozfz

Malware Config

Targets

    • Target

      8b6f78b7eeefb77e5d7ad15cfb47f79b58eb7bb48a1eeb0819014a54502e7167

    • Size

      152KB

    • MD5

      3ae3584f0b9fce0c2321a41e985bea79

    • SHA1

      0fe8abf2884e853a735e93b46bb533109d35c7c2

    • SHA256

      8b6f78b7eeefb77e5d7ad15cfb47f79b58eb7bb48a1eeb0819014a54502e7167

    • SHA512

      49f158f5ce2e309cf70c1b1988e01adc44a515c4a3fd776e9bf28dcb669336aea72910d5b44447e3d1a5ed1665f0aa23f52915c289400a9bcb2bc38cce79fe83

    • SSDEEP

      1536:W6myQm5x9jSp42U/35fK6q+vMoGMaK9aWLwbOB0QQiz:rn3Wy2w5fK6tvFt9aW+Ozfz

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks