General

  • Target

    dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5

  • Size

    98KB

  • Sample

    210509-ldzbkeylbj

  • MD5

    c94c47b62d0b6dd0da48475613e40c9f

  • SHA1

    2bbe856ed8f59e54f7090b36b16f5ed45fd54050

  • SHA256

    dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5

  • SHA512

    252b9b2a4a7c0c9c61917492f9a111e9928dcc8c2cd2ec64c0013173cf27f1cadbda1ca222bc439ea2119c2610d526325196e9fae0327fcb235847c216f4d436

Malware Config

Targets

    • Target

      dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5

    • Size

      98KB

    • MD5

      c94c47b62d0b6dd0da48475613e40c9f

    • SHA1

      2bbe856ed8f59e54f7090b36b16f5ed45fd54050

    • SHA256

      dca0743551b1abb91d52a621f914d1f8fffdc75e265322d52c491fcd2e6849a5

    • SHA512

      252b9b2a4a7c0c9c61917492f9a111e9928dcc8c2cd2ec64c0013173cf27f1cadbda1ca222bc439ea2119c2610d526325196e9fae0327fcb235847c216f4d436

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks