General

  • Target

    72d79cddb1cc5108c6b187cb4f1d38c336db2c3a7efb2d9801a381d7e3898428

  • Size

    98KB

  • Sample

    210509-z79agt4b1j

  • MD5

    43d66dfcb07797f1b77ac430a7154d29

  • SHA1

    f86291f73c5777385161cd99c00f953518a7beaa

  • SHA256

    72d79cddb1cc5108c6b187cb4f1d38c336db2c3a7efb2d9801a381d7e3898428

  • SHA512

    d5fb27f44f2d6d5859f25dad8066f1726dc8115c855e9a444985784a4145d318ab5109a737e41ee94828aee5e921c520c5c04b39694678db2f83a541832517fb

Malware Config

Targets

    • Target

      72d79cddb1cc5108c6b187cb4f1d38c336db2c3a7efb2d9801a381d7e3898428

    • Size

      98KB

    • MD5

      43d66dfcb07797f1b77ac430a7154d29

    • SHA1

      f86291f73c5777385161cd99c00f953518a7beaa

    • SHA256

      72d79cddb1cc5108c6b187cb4f1d38c336db2c3a7efb2d9801a381d7e3898428

    • SHA512

      d5fb27f44f2d6d5859f25dad8066f1726dc8115c855e9a444985784a4145d318ab5109a737e41ee94828aee5e921c520c5c04b39694678db2f83a541832517fb

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks