General

  • Target

    2025-03-30_c4c3d0b49ebdab4d458f5298c3714225_amadey_rhadamanthys_smoke-loader

  • Size

    237KB

  • Sample

    250330-z57ayazkw2

  • MD5

    c4c3d0b49ebdab4d458f5298c3714225

  • SHA1

    6b5421e260a8b6bdfccabd25157c884fbfa1ee84

  • SHA256

    5ab0f33028e741a4a9ee4061137b12ce2977690fc034b631b3de109c6d0fa4bc

  • SHA512

    2b9c0f40ac1d4ad95df40b14033fd0d9a2da28351674b519060bb1130abfc4046bbd807d3d1a9cce0d2bd21bd51293273fdb55bc4be7b54b94c4399339a6db6d

  • SSDEEP

    6144:QA2P27yTAnKGw0hjFhSR/W1nyAJ9v0pMtRCpYQ:QATuTAnKGwUAWVycQqgj

Malware Config

Targets

    • Target

      2025-03-30_c4c3d0b49ebdab4d458f5298c3714225_amadey_rhadamanthys_smoke-loader

    • Size

      237KB

    • MD5

      c4c3d0b49ebdab4d458f5298c3714225

    • SHA1

      6b5421e260a8b6bdfccabd25157c884fbfa1ee84

    • SHA256

      5ab0f33028e741a4a9ee4061137b12ce2977690fc034b631b3de109c6d0fa4bc

    • SHA512

      2b9c0f40ac1d4ad95df40b14033fd0d9a2da28351674b519060bb1130abfc4046bbd807d3d1a9cce0d2bd21bd51293273fdb55bc4be7b54b94c4399339a6db6d

    • SSDEEP

      6144:QA2P27yTAnKGw0hjFhSR/W1nyAJ9v0pMtRCpYQ:QATuTAnKGwUAWVycQqgj

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

MITRE ATT&CK Enterprise v15

Tasks