General

  • Target

    d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe

  • Size

    54KB

  • Sample

    250208-bc3v2sxqdl

  • MD5

    2b8717d636eb87a3a24d4b1e8cf7e4c0

  • SHA1

    9086a93063a74f23a8f785f42319161792abd7f1

  • SHA256

    d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3

  • SHA512

    97c33de02c8ffd06d2d55a71b8e62fff9ea384ae53a675f012ae4f9e17d23c6aed90daf70b71b440f5e658f508bfb15f21170f95f3c246c4d47e53c590f342b0

  • SSDEEP

    768:O3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:G5tPusSRJDTlLTOpJiaDjts4gfFi2+A

Malware Config

Targets

    • Target

      d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3N.exe

    • Size

      54KB

    • MD5

      2b8717d636eb87a3a24d4b1e8cf7e4c0

    • SHA1

      9086a93063a74f23a8f785f42319161792abd7f1

    • SHA256

      d0b5c06b3f578c17553456dc495055e401111faf611024d5c636f63d95295dc3

    • SHA512

      97c33de02c8ffd06d2d55a71b8e62fff9ea384ae53a675f012ae4f9e17d23c6aed90daf70b71b440f5e658f508bfb15f21170f95f3c246c4d47e53c590f342b0

    • SSDEEP

      768:O3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:G5tPusSRJDTlLTOpJiaDjts4gfFi2+A

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks