General

  • Target

    e42c2a0dad93741e4985351f824ed7659f6c8fa5ddeef6bc46c398a87bff7ec9N.exe

  • Size

    54KB

  • Sample

    250205-b8d7kavmbk

  • MD5

    31f454915de85273053972470c085b40

  • SHA1

    7c7720307edc58be58a8cf90a1c95c5f3e9011b4

  • SHA256

    e42c2a0dad93741e4985351f824ed7659f6c8fa5ddeef6bc46c398a87bff7ec9

  • SHA512

    d2a328b4146b109c9abb71367b2397dccdb1f51b96b6359a18ea6ce8666abc96a223844953e7b9d268c46324ab89fe087f13138eb4e9adf5478f464faae98ab4

  • SSDEEP

    768:+3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:25tPusSRJDTlLTOpJiaDjts4gfFi2+A

Malware Config

Targets

    • Target

      e42c2a0dad93741e4985351f824ed7659f6c8fa5ddeef6bc46c398a87bff7ec9N.exe

    • Size

      54KB

    • MD5

      31f454915de85273053972470c085b40

    • SHA1

      7c7720307edc58be58a8cf90a1c95c5f3e9011b4

    • SHA256

      e42c2a0dad93741e4985351f824ed7659f6c8fa5ddeef6bc46c398a87bff7ec9

    • SHA512

      d2a328b4146b109c9abb71367b2397dccdb1f51b96b6359a18ea6ce8666abc96a223844953e7b9d268c46324ab89fe087f13138eb4e9adf5478f464faae98ab4

    • SSDEEP

      768:+3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:25tPusSRJDTlLTOpJiaDjts4gfFi2+A

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks