General

  • Target

    2025-03-31_75fb3dba14dba46bded865ba870d859f_amadey_rhadamanthys_smoke-loader

  • Size

    225KB

  • Sample

    250331-en4hhasxgs

  • MD5

    75fb3dba14dba46bded865ba870d859f

  • SHA1

    f76989f7e2799b3a4a0b146d01a06b8ca149a807

  • SHA256

    1123043ca445e0dfaff9824395c3501826bc13dfdce058f618d2c956b7320724

  • SHA512

    314355b5acc8149ac4babfc13fae8a1841e69c2251984cbcf56992f24cc79016477441759846293a75a9ad03453b2e1718b636378f5505f46169423581739af5

  • SSDEEP

    6144:aA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:aATuTAnKGwUAW3ycQqgf

Malware Config

Targets

    • Target

      2025-03-31_75fb3dba14dba46bded865ba870d859f_amadey_rhadamanthys_smoke-loader

    • Size

      225KB

    • MD5

      75fb3dba14dba46bded865ba870d859f

    • SHA1

      f76989f7e2799b3a4a0b146d01a06b8ca149a807

    • SHA256

      1123043ca445e0dfaff9824395c3501826bc13dfdce058f618d2c956b7320724

    • SHA512

      314355b5acc8149ac4babfc13fae8a1841e69c2251984cbcf56992f24cc79016477441759846293a75a9ad03453b2e1718b636378f5505f46169423581739af5

    • SSDEEP

      6144:aA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:aATuTAnKGwUAW3ycQqgf

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks