General

  • Target

    73097548f0116d8e2a27cef923fe6930cf8aa804e90760fa1d604e47690a69d4

  • Size

    98KB

  • Sample

    210508-p5t1dmt7te

  • MD5

    af55c0ed23d3a2d9bc8566817d151351

  • SHA1

    6e020f5e943fb922ef7b1d84ee802264ce5a6f95

  • SHA256

    73097548f0116d8e2a27cef923fe6930cf8aa804e90760fa1d604e47690a69d4

  • SHA512

    a84ebe5be649951ee2a84bd439695093474a0aa9361c1f782b81eeb2cee1044a3b8db488fe2d4b486309f6649e39629573a01f2c1f8f92baef84e3324624ea5e

Malware Config

Targets

    • Target

      73097548f0116d8e2a27cef923fe6930cf8aa804e90760fa1d604e47690a69d4

    • Size

      98KB

    • MD5

      af55c0ed23d3a2d9bc8566817d151351

    • SHA1

      6e020f5e943fb922ef7b1d84ee802264ce5a6f95

    • SHA256

      73097548f0116d8e2a27cef923fe6930cf8aa804e90760fa1d604e47690a69d4

    • SHA512

      a84ebe5be649951ee2a84bd439695093474a0aa9361c1f782b81eeb2cee1044a3b8db488fe2d4b486309f6649e39629573a01f2c1f8f92baef84e3324624ea5e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks