General

  • Target

    67b13141eade757805f53788c5494782e2a75133ca9c665addd5e65b60a7cf1d

  • Size

    54KB

  • Sample

    250221-bz1n7szmej

  • MD5

    20c7d1e815f4a9fd7f1abc918e87350e

  • SHA1

    5f2b41b7b187a5453617f84c138d06a0b7428483

  • SHA256

    67b13141eade757805f53788c5494782e2a75133ca9c665addd5e65b60a7cf1d

  • SHA512

    0fe3f7d15a0e6724268200fe8b173500b16289ec909f14123331f1bfce5f4c9443a1ea58897b09163bc8bd03bb66a372da436aae0269a1980772e0a91718dc6f

  • SSDEEP

    768:P3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:/5tPusSRJDTlLTOpJiaDjts4gfFi2+A

Malware Config

Targets

    • Target

      67b13141eade757805f53788c5494782e2a75133ca9c665addd5e65b60a7cf1d

    • Size

      54KB

    • MD5

      20c7d1e815f4a9fd7f1abc918e87350e

    • SHA1

      5f2b41b7b187a5453617f84c138d06a0b7428483

    • SHA256

      67b13141eade757805f53788c5494782e2a75133ca9c665addd5e65b60a7cf1d

    • SHA512

      0fe3f7d15a0e6724268200fe8b173500b16289ec909f14123331f1bfce5f4c9443a1ea58897b09163bc8bd03bb66a372da436aae0269a1980772e0a91718dc6f

    • SSDEEP

      768:P3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:/5tPusSRJDTlLTOpJiaDjts4gfFi2+A

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks