General

  • Target

    b3b963488acd8e02409dde8b659a8274a50260d24e98f3344161420cc0455345

  • Size

    152KB

  • Sample

    210508-s9b89refds

  • MD5

    c4f9a35e5e7b74b08bbf5a60f3041631

  • SHA1

    3eb9356324243d6210c08d927ff8711f670246ea

  • SHA256

    b3b963488acd8e02409dde8b659a8274a50260d24e98f3344161420cc0455345

  • SHA512

    6f39c8eb420843d7c8087b056ec7337e465467fe6cd95f0caf20ece243f5e24d3c7c9de313ef06333485946a92e6c3388f2ea9fe49670cadb978a7a2269d3e20

Malware Config

Targets

    • Target

      b3b963488acd8e02409dde8b659a8274a50260d24e98f3344161420cc0455345

    • Size

      152KB

    • MD5

      c4f9a35e5e7b74b08bbf5a60f3041631

    • SHA1

      3eb9356324243d6210c08d927ff8711f670246ea

    • SHA256

      b3b963488acd8e02409dde8b659a8274a50260d24e98f3344161420cc0455345

    • SHA512

      6f39c8eb420843d7c8087b056ec7337e465467fe6cd95f0caf20ece243f5e24d3c7c9de313ef06333485946a92e6c3388f2ea9fe49670cadb978a7a2269d3e20

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks