General

  • Target

    30d0a7713a2cbd7751853519f876d1b0918319463a6c2cfdfd3966a243ee97c7

  • Size

    136KB

  • Sample

    210508-f5xrwz3pyj

  • MD5

    be4e939fcbe12530872d5fc913d851fa

  • SHA1

    7493ee4fd5bb99ec93e4501b68e5506c95d9aa31

  • SHA256

    30d0a7713a2cbd7751853519f876d1b0918319463a6c2cfdfd3966a243ee97c7

  • SHA512

    8117305e7ba00de35abac6e540ba3b184f03c56e20a8a728e7f21ed443f65e5e9be12a37ce84913832fc99f4b5196dfd74ad2050a58613651d0847c08dae1bae

Malware Config

Targets

    • Target

      30d0a7713a2cbd7751853519f876d1b0918319463a6c2cfdfd3966a243ee97c7

    • Size

      136KB

    • MD5

      be4e939fcbe12530872d5fc913d851fa

    • SHA1

      7493ee4fd5bb99ec93e4501b68e5506c95d9aa31

    • SHA256

      30d0a7713a2cbd7751853519f876d1b0918319463a6c2cfdfd3966a243ee97c7

    • SHA512

      8117305e7ba00de35abac6e540ba3b184f03c56e20a8a728e7f21ed443f65e5e9be12a37ce84913832fc99f4b5196dfd74ad2050a58613651d0847c08dae1bae

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks