General

  • Target

    8e72b36486d0ffd233fac35573c12af737cfb9d4bf41ae5e8ddbc5906340d332.exe

  • Size

    54KB

  • Sample

    250127-cek9fswlcm

  • MD5

    e4a40ac8e9842429743c32cfa145c448

  • SHA1

    4efee31b489575da727553ef6deda659155a461d

  • SHA256

    8e72b36486d0ffd233fac35573c12af737cfb9d4bf41ae5e8ddbc5906340d332

  • SHA512

    2d3efc20640b15f18145c6bfa8573bd0cd8278a59b5eec9dbbf7b97d7a87869f3c2cdf9c41004c5bf3578c6315c61bb32d38eb94a0fc4ccf0d01e8a8eb77a385

  • SSDEEP

    768:+3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBi:25tPusSRJDTlLTOpJiaDjts4gfFi2+g

Malware Config

Targets

    • Target

      8e72b36486d0ffd233fac35573c12af737cfb9d4bf41ae5e8ddbc5906340d332.exe

    • Size

      54KB

    • MD5

      e4a40ac8e9842429743c32cfa145c448

    • SHA1

      4efee31b489575da727553ef6deda659155a461d

    • SHA256

      8e72b36486d0ffd233fac35573c12af737cfb9d4bf41ae5e8ddbc5906340d332

    • SHA512

      2d3efc20640b15f18145c6bfa8573bd0cd8278a59b5eec9dbbf7b97d7a87869f3c2cdf9c41004c5bf3578c6315c61bb32d38eb94a0fc4ccf0d01e8a8eb77a385

    • SSDEEP

      768:+3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBi:25tPusSRJDTlLTOpJiaDjts4gfFi2+g

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks