General

  • Target

    f2fc2344519abe279ae510774be3e45c5fdae1269892d0b2068efc8a1ebd843aN.exe

  • Size

    54KB

  • Sample

    250208-r5n6cs1jg1

  • MD5

    265847d58a886c5f4e3ef45dd02ed2f0

  • SHA1

    d34f6efc8b6829afd4ca78fe5f85d0d3d820ebf9

  • SHA256

    f2fc2344519abe279ae510774be3e45c5fdae1269892d0b2068efc8a1ebd843a

  • SHA512

    e928fc845f6c9689010cc54b2cd16570f972ef691966cd27e122741e4cf8c577cfbfc9fc24a16410b6173ee43a82ab18472c700fdf934ff75eebf4defb5d9165

  • SSDEEP

    768:23CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:u5tPusSRJDTlLTOpJiaDjts4gfFi2+A

Malware Config

Targets

    • Target

      f2fc2344519abe279ae510774be3e45c5fdae1269892d0b2068efc8a1ebd843aN.exe

    • Size

      54KB

    • MD5

      265847d58a886c5f4e3ef45dd02ed2f0

    • SHA1

      d34f6efc8b6829afd4ca78fe5f85d0d3d820ebf9

    • SHA256

      f2fc2344519abe279ae510774be3e45c5fdae1269892d0b2068efc8a1ebd843a

    • SHA512

      e928fc845f6c9689010cc54b2cd16570f972ef691966cd27e122741e4cf8c577cfbfc9fc24a16410b6173ee43a82ab18472c700fdf934ff75eebf4defb5d9165

    • SSDEEP

      768:23CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:u5tPusSRJDTlLTOpJiaDjts4gfFi2+A

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks