General

  • Target

    ff72623ff0898ab1ffae60e39ca079b01fb32a2be47eadeab57ea2c09cf80d7cN.exe

  • Size

    54KB

  • Sample

    250126-bz8ptaypdn

  • MD5

    7381b9c7d9bd5949002117b9b65f8bc0

  • SHA1

    e0c787e9c5fccb20c5610c9a20b52e4d338b3870

  • SHA256

    ff72623ff0898ab1ffae60e39ca079b01fb32a2be47eadeab57ea2c09cf80d7c

  • SHA512

    49066db9c74645607b839b7b43b87ff80f0c5f2863f5d025c57bf94eaca7eb03faa317fffdad1121560807aca9929ec9dd5da38d2c5a5804aecb662f076f16a9

  • SSDEEP

    768:s3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:85tPusSRJDTlLTOpJiaDjts4gfFi2+A

Malware Config

Targets

    • Target

      ff72623ff0898ab1ffae60e39ca079b01fb32a2be47eadeab57ea2c09cf80d7cN.exe

    • Size

      54KB

    • MD5

      7381b9c7d9bd5949002117b9b65f8bc0

    • SHA1

      e0c787e9c5fccb20c5610c9a20b52e4d338b3870

    • SHA256

      ff72623ff0898ab1ffae60e39ca079b01fb32a2be47eadeab57ea2c09cf80d7c

    • SHA512

      49066db9c74645607b839b7b43b87ff80f0c5f2863f5d025c57bf94eaca7eb03faa317fffdad1121560807aca9929ec9dd5da38d2c5a5804aecb662f076f16a9

    • SSDEEP

      768:s3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:85tPusSRJDTlLTOpJiaDjts4gfFi2+A

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks