General

  • Target

    b1c2799b3d038e31ada575f950ef44bf535c8f7c63f5aa548e1a28510d388a25.exe

  • Size

    54KB

  • Sample

    250212-qxj11atkal

  • MD5

    9c075695fdcd565287d2cad1f4814330

  • SHA1

    b9d97ecc70769e7b668d91650dd2f2d08da985ee

  • SHA256

    b1c2799b3d038e31ada575f950ef44bf535c8f7c63f5aa548e1a28510d388a25

  • SHA512

    5b80bb22a9c3106753c4d74d758d52ee2441f56281fcade8e7780e71db9cb6b4766ac3ce7e920b3b8067e236632c2751c5c1b4e57f860e854067b64205797495

  • SSDEEP

    768:O3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBC:G5tPusSRJDTlLTOpJiaDjts4gfFi2+g

Malware Config

Targets

    • Target

      b1c2799b3d038e31ada575f950ef44bf535c8f7c63f5aa548e1a28510d388a25.exe

    • Size

      54KB

    • MD5

      9c075695fdcd565287d2cad1f4814330

    • SHA1

      b9d97ecc70769e7b668d91650dd2f2d08da985ee

    • SHA256

      b1c2799b3d038e31ada575f950ef44bf535c8f7c63f5aa548e1a28510d388a25

    • SHA512

      5b80bb22a9c3106753c4d74d758d52ee2441f56281fcade8e7780e71db9cb6b4766ac3ce7e920b3b8067e236632c2751c5c1b4e57f860e854067b64205797495

    • SSDEEP

      768:O3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBC:G5tPusSRJDTlLTOpJiaDjts4gfFi2+g

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks