General

  • Target

    2025-03-31_0987287d8080bb01c6bddcaf7978d8c9_amadey_rhadamanthys_smoke-loader

  • Size

    225KB

  • Sample

    250331-d1hwwsvlw9

  • MD5

    0987287d8080bb01c6bddcaf7978d8c9

  • SHA1

    44370dee0cafa4dfd353b01457cff2644474ddaf

  • SHA256

    e7af38dcb89e31ce2b5bda199a9816b44d336194d234aff64f06c6b99bcaddf5

  • SHA512

    3f48d20263ea9a18dc14d26d2336a92349a19f0cf20e76942cb94686fe126cf55ae3fef84ed2a180efb4884e79f50f882c9fee44d7c582b6cfebdbfa9a3255de

  • SSDEEP

    6144:vA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:vATuTAnKGwUAW3ycQqgf

Malware Config

Targets

    • Target

      2025-03-31_0987287d8080bb01c6bddcaf7978d8c9_amadey_rhadamanthys_smoke-loader

    • Size

      225KB

    • MD5

      0987287d8080bb01c6bddcaf7978d8c9

    • SHA1

      44370dee0cafa4dfd353b01457cff2644474ddaf

    • SHA256

      e7af38dcb89e31ce2b5bda199a9816b44d336194d234aff64f06c6b99bcaddf5

    • SHA512

      3f48d20263ea9a18dc14d26d2336a92349a19f0cf20e76942cb94686fe126cf55ae3fef84ed2a180efb4884e79f50f882c9fee44d7c582b6cfebdbfa9a3255de

    • SSDEEP

      6144:vA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:vATuTAnKGwUAW3ycQqgf

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks