General

  • Target

    2df52c9713c926a3640558f3446334001f6a9b0747849cda74039c0674b39573

  • Size

    98KB

  • Sample

    210509-6sl6qdctsa

  • MD5

    c266bc48d516ba152dac867159118ac0

  • SHA1

    76d3f461a28daadc027e95b8fe472df6a597452f

  • SHA256

    2df52c9713c926a3640558f3446334001f6a9b0747849cda74039c0674b39573

  • SHA512

    05e221c738ab83f3c09242080a9008f70a1a18fb9ea02595805478a76d2609d6773353cfdad3b68100038435d4aac994f7bf45325284d5f97c837fb531fc9d57

Malware Config

Targets

    • Target

      2df52c9713c926a3640558f3446334001f6a9b0747849cda74039c0674b39573

    • Size

      98KB

    • MD5

      c266bc48d516ba152dac867159118ac0

    • SHA1

      76d3f461a28daadc027e95b8fe472df6a597452f

    • SHA256

      2df52c9713c926a3640558f3446334001f6a9b0747849cda74039c0674b39573

    • SHA512

      05e221c738ab83f3c09242080a9008f70a1a18fb9ea02595805478a76d2609d6773353cfdad3b68100038435d4aac994f7bf45325284d5f97c837fb531fc9d57

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks