General

  • Target

    0b0e3ff65e172cda702d2777168a8e3df55b0aa39e05f9b223e8f4eee33e57a5.exe

  • Size

    54KB

  • Sample

    250212-xtvfwstnem

  • MD5

    98cf05bb45be564f98c4dee1491945b2

  • SHA1

    d329c830e12231af64d5b78ca0a6798c47aca6b0

  • SHA256

    0b0e3ff65e172cda702d2777168a8e3df55b0aa39e05f9b223e8f4eee33e57a5

  • SHA512

    8bf570bc9be17949fafef5cecfd068737418f176ac5eebbb384352b986c218bf7c048c0bd24dfc84601e733e8add4992acf9002287ab723fd66bea7d8fec76aa

  • SSDEEP

    768:V3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBy:F5tPusSRJDTlLTOpJiaDjts4gfFi2+A

Malware Config

Targets

    • Target

      0b0e3ff65e172cda702d2777168a8e3df55b0aa39e05f9b223e8f4eee33e57a5.exe

    • Size

      54KB

    • MD5

      98cf05bb45be564f98c4dee1491945b2

    • SHA1

      d329c830e12231af64d5b78ca0a6798c47aca6b0

    • SHA256

      0b0e3ff65e172cda702d2777168a8e3df55b0aa39e05f9b223e8f4eee33e57a5

    • SHA512

      8bf570bc9be17949fafef5cecfd068737418f176ac5eebbb384352b986c218bf7c048c0bd24dfc84601e733e8add4992acf9002287ab723fd66bea7d8fec76aa

    • SSDEEP

      768:V3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBy:F5tPusSRJDTlLTOpJiaDjts4gfFi2+A

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Downloads MZ/PE file

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks