General

  • Target

    939f6cae23a5819bc16d1b73d7289f5b2413f94041a35e5825795d538a7977cb

  • Size

    54KB

  • Sample

    250225-c3yvfsxqs5

  • MD5

    b77f8015cb2d0359f55d4dc8eac09633

  • SHA1

    5cb8c904b3ad657f59c186e67527f0a2ca98cb11

  • SHA256

    939f6cae23a5819bc16d1b73d7289f5b2413f94041a35e5825795d538a7977cb

  • SHA512

    b802eaf54485064d904b654d92927b0a7fcfaf0e1ee87df9364cb748a640034e8ef8cd0a752f9d1dd505dfd7324d212d557d55035f44f7867a7057d88b830a4a

  • SSDEEP

    768:c3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:s5tPusSRJDTlLTOpJiaDjts4gfFi2+A

Malware Config

Targets

    • Target

      939f6cae23a5819bc16d1b73d7289f5b2413f94041a35e5825795d538a7977cb

    • Size

      54KB

    • MD5

      b77f8015cb2d0359f55d4dc8eac09633

    • SHA1

      5cb8c904b3ad657f59c186e67527f0a2ca98cb11

    • SHA256

      939f6cae23a5819bc16d1b73d7289f5b2413f94041a35e5825795d538a7977cb

    • SHA512

      b802eaf54485064d904b654d92927b0a7fcfaf0e1ee87df9364cb748a640034e8ef8cd0a752f9d1dd505dfd7324d212d557d55035f44f7867a7057d88b830a4a

    • SSDEEP

      768:c3CCRtWM5usSRJDTlLTOpJiqRZNoCRtxihG1gfFNsHWP4jBS:s5tPusSRJDTlLTOpJiaDjts4gfFi2+A

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks