General

  • Target

    cfd2e3ae5e1ce93f945ce9f8dff2a40cb1d9b42c792c78538afdb0156a28cf83

  • Size

    98KB

  • Sample

    210505-el9pnbqjts

  • MD5

    d3e18555a8af529c861225153fec365a

  • SHA1

    0d569925bd67e403e305ebfea64a9925a45c2139

  • SHA256

    cfd2e3ae5e1ce93f945ce9f8dff2a40cb1d9b42c792c78538afdb0156a28cf83

  • SHA512

    659e5ae0cb73aef67cd85034ee088e380ee4dcc4c3e4f4936e0ee8e87786ea94dfe2a9e45bdbb21f4278b5e3aad22c3d44b582ef16a549a0a2d6fb54c152e875

Malware Config

Targets

    • Target

      cfd2e3ae5e1ce93f945ce9f8dff2a40cb1d9b42c792c78538afdb0156a28cf83

    • Size

      98KB

    • MD5

      d3e18555a8af529c861225153fec365a

    • SHA1

      0d569925bd67e403e305ebfea64a9925a45c2139

    • SHA256

      cfd2e3ae5e1ce93f945ce9f8dff2a40cb1d9b42c792c78538afdb0156a28cf83

    • SHA512

      659e5ae0cb73aef67cd85034ee088e380ee4dcc4c3e4f4936e0ee8e87786ea94dfe2a9e45bdbb21f4278b5e3aad22c3d44b582ef16a549a0a2d6fb54c152e875

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks