General

  • Target

    49b7efb1991a15445d8eddb15bb505c901ccf00ed7dcad7e52b5681cb3ce890d

  • Size

    62KB

  • Sample

    250224-2pypzasjy9

  • MD5

    4292fd1e4dc085b603185752e948cf60

  • SHA1

    bc435f0d906b8e7545eac548c1779b69ba83f1c1

  • SHA256

    49b7efb1991a15445d8eddb15bb505c901ccf00ed7dcad7e52b5681cb3ce890d

  • SHA512

    f81bce4769773c3fffe73407d4a62d42c5cc41294fe748c70a7b9148e12508c6267097b91323d982809e97dd72c59081853e1858cc99955a5c5985bf18c8a447

  • SSDEEP

    768:MQiFq/HBQ/FuktI39dPOsB9kjI41E14grGe76g80MD7q/HBQQQOtZaO7X/RAaabu:DgquFSk3iMD7qVtzDR5aKiBlGKFCB

Malware Config

Targets

    • Target

      49b7efb1991a15445d8eddb15bb505c901ccf00ed7dcad7e52b5681cb3ce890d

    • Size

      62KB

    • MD5

      4292fd1e4dc085b603185752e948cf60

    • SHA1

      bc435f0d906b8e7545eac548c1779b69ba83f1c1

    • SHA256

      49b7efb1991a15445d8eddb15bb505c901ccf00ed7dcad7e52b5681cb3ce890d

    • SHA512

      f81bce4769773c3fffe73407d4a62d42c5cc41294fe748c70a7b9148e12508c6267097b91323d982809e97dd72c59081853e1858cc99955a5c5985bf18c8a447

    • SSDEEP

      768:MQiFq/HBQ/FuktI39dPOsB9kjI41E14grGe76g80MD7q/HBQQQOtZaO7X/RAaabu:DgquFSk3iMD7qVtzDR5aKiBlGKFCB

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks