General

  • Target

    3f7c9a58918820566319d91244e12b0b9941947105e6cd94794fb84f1c066a53N.exe

  • Size

    54KB

  • Sample

    250124-kfas4szjdx

  • MD5

    69f776613decfe0881a2b70843d64420

  • SHA1

    9ecc5e4ea25e93a733ca1911ea63196acf3cb68b

  • SHA256

    3f7c9a58918820566319d91244e12b0b9941947105e6cd94794fb84f1c066a53

  • SHA512

    2934f9b94949d8b81da9b39d9aabbec16a1bd954af26e87fe693621c3b1331e79042ab5b51714c39407529eee95586a8766a7afc8ed69e678dc4ae60a664dd58

  • SSDEEP

    768:j3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:b5tPusSRJDTlLTOpJiaDjts4gfFi2+A

Malware Config

Targets

    • Target

      3f7c9a58918820566319d91244e12b0b9941947105e6cd94794fb84f1c066a53N.exe

    • Size

      54KB

    • MD5

      69f776613decfe0881a2b70843d64420

    • SHA1

      9ecc5e4ea25e93a733ca1911ea63196acf3cb68b

    • SHA256

      3f7c9a58918820566319d91244e12b0b9941947105e6cd94794fb84f1c066a53

    • SHA512

      2934f9b94949d8b81da9b39d9aabbec16a1bd954af26e87fe693621c3b1331e79042ab5b51714c39407529eee95586a8766a7afc8ed69e678dc4ae60a664dd58

    • SSDEEP

      768:j3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:b5tPusSRJDTlLTOpJiaDjts4gfFi2+A

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks