General

  • Target

    944d225296ed413fd6c75d736077f90c4fff9383187021c7d99de57cde624358

  • Size

    98KB

  • Sample

    210509-rz5nzkkwce

  • MD5

    f9ab804e7f2daecd96fc65f3735c7d88

  • SHA1

    ba42e12d1ad5d80f1c0fbc620ae73de30f9b3a28

  • SHA256

    944d225296ed413fd6c75d736077f90c4fff9383187021c7d99de57cde624358

  • SHA512

    f42957b9fcea392a697ff6ce1175873d05ad6834991aa331d7931eb05ab6c5ee155bf91043ec91d98aced7fcf75d25f494a1439b568064059594bab8a115b145

Malware Config

Targets

    • Target

      944d225296ed413fd6c75d736077f90c4fff9383187021c7d99de57cde624358

    • Size

      98KB

    • MD5

      f9ab804e7f2daecd96fc65f3735c7d88

    • SHA1

      ba42e12d1ad5d80f1c0fbc620ae73de30f9b3a28

    • SHA256

      944d225296ed413fd6c75d736077f90c4fff9383187021c7d99de57cde624358

    • SHA512

      f42957b9fcea392a697ff6ce1175873d05ad6834991aa331d7931eb05ab6c5ee155bf91043ec91d98aced7fcf75d25f494a1439b568064059594bab8a115b145

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks