General

  • Target

    374eee49b5b0ed5275f5d27ba72c224c24eb03ef14b84e4a07616815327cad80

  • Size

    62KB

  • Sample

    250222-1gnpcsznfj

  • MD5

    e03ba1556b6d4ecde345053a726668c8

  • SHA1

    a83dd1e75b20c472f337497caa8c92be8c381b08

  • SHA256

    374eee49b5b0ed5275f5d27ba72c224c24eb03ef14b84e4a07616815327cad80

  • SHA512

    4da914055c79c369c2121bb6a25e9d1dfa30ca176c13d2842be4381d957b0eeb63565b68e6a732faffca6d561290abc9a1f7248095baa8d66ad7c1fc697fbc26

  • SSDEEP

    768:zQiFq/HBQ/FuktI39dPOsB9kjI41E14grGe76g80MD7q/HBQQQOtZaO7X/RAaabu:8gquFSk3iMD7qVtzDR5aKiBlGKFCB

Malware Config

Targets

    • Target

      374eee49b5b0ed5275f5d27ba72c224c24eb03ef14b84e4a07616815327cad80

    • Size

      62KB

    • MD5

      e03ba1556b6d4ecde345053a726668c8

    • SHA1

      a83dd1e75b20c472f337497caa8c92be8c381b08

    • SHA256

      374eee49b5b0ed5275f5d27ba72c224c24eb03ef14b84e4a07616815327cad80

    • SHA512

      4da914055c79c369c2121bb6a25e9d1dfa30ca176c13d2842be4381d957b0eeb63565b68e6a732faffca6d561290abc9a1f7248095baa8d66ad7c1fc697fbc26

    • SSDEEP

      768:zQiFq/HBQ/FuktI39dPOsB9kjI41E14grGe76g80MD7q/HBQQQOtZaO7X/RAaabu:8gquFSk3iMD7qVtzDR5aKiBlGKFCB

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks