General

  • Target

    b332b6c2945a68b9a5f9f3ece9580b20055f8fd144e55415a70cb333b37aac7e.exe

  • Size

    54KB

  • Sample

    250224-qqlagsvls8

  • MD5

    3e4f5925ab8cff3cf37c5fd7d7b14873

  • SHA1

    83f334dc9c53015bd335f8aba36f5381daafccc2

  • SHA256

    b332b6c2945a68b9a5f9f3ece9580b20055f8fd144e55415a70cb333b37aac7e

  • SHA512

    ce481598398c6b82a7314b0d09532686096715c9d83379f2a98e97c587f5a1d1fb0196baefbdca0b66d32ec3b7941caf964b8bf8153af8528f15b4dbbaee19de

  • SSDEEP

    768:W3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBC:O5tPusSRJDTlLTOpJiaDjts4gfFi2+g

Malware Config

Targets

    • Target

      b332b6c2945a68b9a5f9f3ece9580b20055f8fd144e55415a70cb333b37aac7e.exe

    • Size

      54KB

    • MD5

      3e4f5925ab8cff3cf37c5fd7d7b14873

    • SHA1

      83f334dc9c53015bd335f8aba36f5381daafccc2

    • SHA256

      b332b6c2945a68b9a5f9f3ece9580b20055f8fd144e55415a70cb333b37aac7e

    • SHA512

      ce481598398c6b82a7314b0d09532686096715c9d83379f2a98e97c587f5a1d1fb0196baefbdca0b66d32ec3b7941caf964b8bf8153af8528f15b4dbbaee19de

    • SSDEEP

      768:W3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBC:O5tPusSRJDTlLTOpJiaDjts4gfFi2+g

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks