General

  • Target

    2025-03-30_524dcfd872f2ebc52a481c900fd1320e_amadey_rhadamanthys_smoke-loader

  • Size

    225KB

  • Sample

    250330-hjrjxsvjv5

  • MD5

    524dcfd872f2ebc52a481c900fd1320e

  • SHA1

    2881b0b6c692885b14e66c565775a907dc91f99e

  • SHA256

    42690f919f61b87c96c29bc0286ae44762478a5174909d5006b6bd1fc2dd85a1

  • SHA512

    02dea57c359b02896ad7d0c380be29b52850c4815843baaa29d90c23d822a2579ed09df362eb3fa2069219ef3b526fc4c5114b07c7d79db1127ee18b3f0e8d1b

  • SSDEEP

    6144:OA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:OATuTAnKGwUAW3ycQqgf

Malware Config

Targets

    • Target

      2025-03-30_524dcfd872f2ebc52a481c900fd1320e_amadey_rhadamanthys_smoke-loader

    • Size

      225KB

    • MD5

      524dcfd872f2ebc52a481c900fd1320e

    • SHA1

      2881b0b6c692885b14e66c565775a907dc91f99e

    • SHA256

      42690f919f61b87c96c29bc0286ae44762478a5174909d5006b6bd1fc2dd85a1

    • SHA512

      02dea57c359b02896ad7d0c380be29b52850c4815843baaa29d90c23d822a2579ed09df362eb3fa2069219ef3b526fc4c5114b07c7d79db1127ee18b3f0e8d1b

    • SSDEEP

      6144:OA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:OATuTAnKGwUAW3ycQqgf

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks