General

  • Target

    07dec5020a1a6fe8870a8c94271b38decbf17472678ec02ff3c68ffb68f3fac2N.exe

  • Size

    54KB

  • Sample

    250126-3wgkps1mbn

  • MD5

    c86e7823b7361870ee9f7c47d1ad6f50

  • SHA1

    02a9a57aa456d7e85c49dd2bd511f3444f30e6fb

  • SHA256

    07dec5020a1a6fe8870a8c94271b38decbf17472678ec02ff3c68ffb68f3fac2

  • SHA512

    982e3f74155670c86f48726425c48c5c6a9487789d3a5e2e7cb7a73df272d0e1d941acd6b8a89eac97adb192f7648957dae93d53f380c9bb1f7d6d10a8207e19

  • SSDEEP

    768:q3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:65tPusSRJDTlLTOpJiaDjts4gfFi2+A

Malware Config

Targets

    • Target

      07dec5020a1a6fe8870a8c94271b38decbf17472678ec02ff3c68ffb68f3fac2N.exe

    • Size

      54KB

    • MD5

      c86e7823b7361870ee9f7c47d1ad6f50

    • SHA1

      02a9a57aa456d7e85c49dd2bd511f3444f30e6fb

    • SHA256

      07dec5020a1a6fe8870a8c94271b38decbf17472678ec02ff3c68ffb68f3fac2

    • SHA512

      982e3f74155670c86f48726425c48c5c6a9487789d3a5e2e7cb7a73df272d0e1d941acd6b8a89eac97adb192f7648957dae93d53f380c9bb1f7d6d10a8207e19

    • SSDEEP

      768:q3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:65tPusSRJDTlLTOpJiaDjts4gfFi2+A

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks