General

  • Target

    842bedb487c38e44618e8da0b472d66ba2c6b356881b7d85c2da04d412aeffe3.exe

  • Size

    54KB

  • Sample

    250205-kyngxszjd1

  • MD5

    9a8c530783c2589b773ed06ba4db67cf

  • SHA1

    0291775b927677de837f367f4bfe19661b0bfae7

  • SHA256

    842bedb487c38e44618e8da0b472d66ba2c6b356881b7d85c2da04d412aeffe3

  • SHA512

    7749b096219e3468aa4005fd864372dcbefd86f3f98143d2c5f49918a07c9c85625bf00118b310d745e77cb8c9439b3ab5c5241fac0028209f77ac1877a05af6

  • SSDEEP

    768:+3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBW:25tPusSRJDTlLTOpJiaDjts4gfFi2+w

Malware Config

Targets

    • Target

      842bedb487c38e44618e8da0b472d66ba2c6b356881b7d85c2da04d412aeffe3.exe

    • Size

      54KB

    • MD5

      9a8c530783c2589b773ed06ba4db67cf

    • SHA1

      0291775b927677de837f367f4bfe19661b0bfae7

    • SHA256

      842bedb487c38e44618e8da0b472d66ba2c6b356881b7d85c2da04d412aeffe3

    • SHA512

      7749b096219e3468aa4005fd864372dcbefd86f3f98143d2c5f49918a07c9c85625bf00118b310d745e77cb8c9439b3ab5c5241fac0028209f77ac1877a05af6

    • SSDEEP

      768:+3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBW:25tPusSRJDTlLTOpJiaDjts4gfFi2+w

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks