General

  • Target

    3b742a755437e97dbb2aeb0cae54556719c0ab49541774aaadc22f8292fa931a

  • Size

    98KB

  • Sample

    210509-hbc35v457a

  • MD5

    ceabbec628e38d10806bbaa24ac4db69

  • SHA1

    fddd22b3aee1cfa4ed60d58da6f15a551a06d8f0

  • SHA256

    3b742a755437e97dbb2aeb0cae54556719c0ab49541774aaadc22f8292fa931a

  • SHA512

    c53dc11f527abfa37fc160fa3be74e3b03859407ff1cfd290adc99096672942fd3cac1dbcec2b5dd83e3e60c1eea71dda2754312f78d970270e293caaa725667

Malware Config

Targets

    • Target

      3b742a755437e97dbb2aeb0cae54556719c0ab49541774aaadc22f8292fa931a

    • Size

      98KB

    • MD5

      ceabbec628e38d10806bbaa24ac4db69

    • SHA1

      fddd22b3aee1cfa4ed60d58da6f15a551a06d8f0

    • SHA256

      3b742a755437e97dbb2aeb0cae54556719c0ab49541774aaadc22f8292fa931a

    • SHA512

      c53dc11f527abfa37fc160fa3be74e3b03859407ff1cfd290adc99096672942fd3cac1dbcec2b5dd83e3e60c1eea71dda2754312f78d970270e293caaa725667

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks