General

  • Target

    eba0ab52182f7497c6b9ae21a67058733081a717f6ecc43a55b2fa4b2557ed9d.exe

  • Size

    54KB

  • Sample

    250125-dn95lstrar

  • MD5

    c322006370baef36ea57f647e97d6832

  • SHA1

    7aacb99e2ef3fc61c0565190f80a696cfae8239e

  • SHA256

    eba0ab52182f7497c6b9ae21a67058733081a717f6ecc43a55b2fa4b2557ed9d

  • SHA512

    1845136b77e0ee1c3353e152337b47be3996bf046ab48cd0a2aabd39a073d4147ac985135b796702106f1a331676547a53caba574500350d241cfe47651238c8

  • SSDEEP

    768:j3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBG:b5tPusSRJDTlLTOpJiaDjts4gfFi2+Q

Malware Config

Targets

    • Target

      eba0ab52182f7497c6b9ae21a67058733081a717f6ecc43a55b2fa4b2557ed9d.exe

    • Size

      54KB

    • MD5

      c322006370baef36ea57f647e97d6832

    • SHA1

      7aacb99e2ef3fc61c0565190f80a696cfae8239e

    • SHA256

      eba0ab52182f7497c6b9ae21a67058733081a717f6ecc43a55b2fa4b2557ed9d

    • SHA512

      1845136b77e0ee1c3353e152337b47be3996bf046ab48cd0a2aabd39a073d4147ac985135b796702106f1a331676547a53caba574500350d241cfe47651238c8

    • SSDEEP

      768:j3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBG:b5tPusSRJDTlLTOpJiaDjts4gfFi2+Q

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks