General

  • Target

    1a53b63b8eea383ada31e8d4fc8026274a6d07284fecb10a55a9bf8a1271464c

  • Size

    54KB

  • Sample

    250222-y1evfsxkbt

  • MD5

    c45e6f1cc54a6e2e47ad4c508717fab8

  • SHA1

    0c3580c57e65d406e8c6d50605523425e5e52a17

  • SHA256

    1a53b63b8eea383ada31e8d4fc8026274a6d07284fecb10a55a9bf8a1271464c

  • SHA512

    3eea4cbfc7697a904d10bcb4680ce17dc7f28e1cf4d8ee66c3e79148db31008fd1ed500a4fc62faaae31bf4527cc274949a4f70003420013fd13175f35896451

  • SSDEEP

    768:v3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:f5tPusSRJDTlLTOpJiaDjts4gfFi2+A

Malware Config

Targets

    • Target

      1a53b63b8eea383ada31e8d4fc8026274a6d07284fecb10a55a9bf8a1271464c

    • Size

      54KB

    • MD5

      c45e6f1cc54a6e2e47ad4c508717fab8

    • SHA1

      0c3580c57e65d406e8c6d50605523425e5e52a17

    • SHA256

      1a53b63b8eea383ada31e8d4fc8026274a6d07284fecb10a55a9bf8a1271464c

    • SHA512

      3eea4cbfc7697a904d10bcb4680ce17dc7f28e1cf4d8ee66c3e79148db31008fd1ed500a4fc62faaae31bf4527cc274949a4f70003420013fd13175f35896451

    • SSDEEP

      768:v3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:f5tPusSRJDTlLTOpJiaDjts4gfFi2+A

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks