General

  • Target

    2025-03-31_ca9f78459eb46051b9989d4a2dc9ce01_amadey_rhadamanthys_smoke-loader

  • Size

    225KB

  • Sample

    250331-e43wxas1gz

  • MD5

    ca9f78459eb46051b9989d4a2dc9ce01

  • SHA1

    77ac029ee9381b061ce492d316225462e82b5066

  • SHA256

    ed552e174cb0795cb6f6e1361fd06f0cd14abfa2cc4189d592cc2d4c77c6ffc7

  • SHA512

    1964167586a765112c0bf080511526320abd87cbc25656e31d248d14d9e582459e82c939bc22f87debf9878aeae9d92302ae1bc8653e0335502b08d1baa7d557

  • SSDEEP

    6144:5A2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:5ATuTAnKGwUAW3ycQqgf

Malware Config

Targets

    • Target

      2025-03-31_ca9f78459eb46051b9989d4a2dc9ce01_amadey_rhadamanthys_smoke-loader

    • Size

      225KB

    • MD5

      ca9f78459eb46051b9989d4a2dc9ce01

    • SHA1

      77ac029ee9381b061ce492d316225462e82b5066

    • SHA256

      ed552e174cb0795cb6f6e1361fd06f0cd14abfa2cc4189d592cc2d4c77c6ffc7

    • SHA512

      1964167586a765112c0bf080511526320abd87cbc25656e31d248d14d9e582459e82c939bc22f87debf9878aeae9d92302ae1bc8653e0335502b08d1baa7d557

    • SSDEEP

      6144:5A2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:5ATuTAnKGwUAW3ycQqgf

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks