General

  • Target

    e695741f303ba79627353128bc397f9360ce4063260d58d19469bef08ddcaf29

  • Size

    54KB

  • Sample

    250224-jfwj5s1lex

  • MD5

    e87511c193696bde9ae5cc2cd350bda7

  • SHA1

    917d9334a81b83a14994303365062504eb0f4363

  • SHA256

    e695741f303ba79627353128bc397f9360ce4063260d58d19469bef08ddcaf29

  • SHA512

    256578043c62f166fbcb1c9680a7ff0fd48679dd8cb913ef0ed038848bf52e7b6984327af461a89a8340bc4298cf201094aec31877991a705647ed58e99996c7

  • SSDEEP

    768:B3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:55tPusSRJDTlLTOpJiaDjts4gfFi2+A

Malware Config

Targets

    • Target

      e695741f303ba79627353128bc397f9360ce4063260d58d19469bef08ddcaf29

    • Size

      54KB

    • MD5

      e87511c193696bde9ae5cc2cd350bda7

    • SHA1

      917d9334a81b83a14994303365062504eb0f4363

    • SHA256

      e695741f303ba79627353128bc397f9360ce4063260d58d19469bef08ddcaf29

    • SHA512

      256578043c62f166fbcb1c9680a7ff0fd48679dd8cb913ef0ed038848bf52e7b6984327af461a89a8340bc4298cf201094aec31877991a705647ed58e99996c7

    • SSDEEP

      768:B3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:55tPusSRJDTlLTOpJiaDjts4gfFi2+A

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks