General

  • Target

    2025-03-31_4360f26e51d18f3cd46564f87a5f89f8_amadey_rhadamanthys_smoke-loader

  • Size

    225KB

  • Sample

    250331-esfx1asycy

  • MD5

    4360f26e51d18f3cd46564f87a5f89f8

  • SHA1

    58036be857b133b06fa0a3852d83eafeeda83647

  • SHA256

    84c1c0138a7305d506185671bc281cb056b04be7d4d84720394244e8cb7a0c20

  • SHA512

    492ea279b584c8b0811059837ba839dbf15f72ab3e6e6e41de58eed37514c2788d089fb131357bd39ba7bf7b517d4a92d731b54cd85563967e8d6b20836bbd56

  • SSDEEP

    6144:vA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:vATuTAnKGwUAW3ycQqgf

Malware Config

Targets

    • Target

      2025-03-31_4360f26e51d18f3cd46564f87a5f89f8_amadey_rhadamanthys_smoke-loader

    • Size

      225KB

    • MD5

      4360f26e51d18f3cd46564f87a5f89f8

    • SHA1

      58036be857b133b06fa0a3852d83eafeeda83647

    • SHA256

      84c1c0138a7305d506185671bc281cb056b04be7d4d84720394244e8cb7a0c20

    • SHA512

      492ea279b584c8b0811059837ba839dbf15f72ab3e6e6e41de58eed37514c2788d089fb131357bd39ba7bf7b517d4a92d731b54cd85563967e8d6b20836bbd56

    • SSDEEP

      6144:vA2P27yTAnKGw0hjFhSR/W11yAJ9v0pMtRCpYM:vATuTAnKGwUAW3ycQqgf

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks