General

  • Target

    c881fa9559c8df01392a329140262fb4881668dc6384a1642df3c4db3dda50ad

  • Size

    136KB

  • Sample

    210511-3b4exknzds

  • MD5

    bac4f0041be169bfafa94fb4df5bce5e

  • SHA1

    b8c9bfe9f2f0233b357920ef1ac0cff5b9e96bf0

  • SHA256

    c881fa9559c8df01392a329140262fb4881668dc6384a1642df3c4db3dda50ad

  • SHA512

    cead2dd3ea9efc1b344b5ffef853dfbbbd24dffbe42f99aba6fc07e6330c341ea844241aca602c2447107cf8916470111bebe56de6e337fe7f948ea495f8bcff

Malware Config

Targets

    • Target

      c881fa9559c8df01392a329140262fb4881668dc6384a1642df3c4db3dda50ad

    • Size

      136KB

    • MD5

      bac4f0041be169bfafa94fb4df5bce5e

    • SHA1

      b8c9bfe9f2f0233b357920ef1ac0cff5b9e96bf0

    • SHA256

      c881fa9559c8df01392a329140262fb4881668dc6384a1642df3c4db3dda50ad

    • SHA512

      cead2dd3ea9efc1b344b5ffef853dfbbbd24dffbe42f99aba6fc07e6330c341ea844241aca602c2447107cf8916470111bebe56de6e337fe7f948ea495f8bcff

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks