General

  • Target

    af57c74d8a1eb56ce2647076959da9b933a7aeaf27bce93d088c3f8cf715a2a6

  • Size

    98KB

  • Sample

    210511-5nhcdppggj

  • MD5

    fd05bfc52fed79af0b2d06e3841c578d

  • SHA1

    4bee39b7d36f71f49fbc6eb702ef76102544ea36

  • SHA256

    af57c74d8a1eb56ce2647076959da9b933a7aeaf27bce93d088c3f8cf715a2a6

  • SHA512

    f2c81027c269f7bd3979532cd9f7168fbd0e5637919c8267184118cc93657ea248619fe9078496904466bc8c74372fe3eb19c4fda95dba7ad67ce28f1056c176

Malware Config

Targets

    • Target

      af57c74d8a1eb56ce2647076959da9b933a7aeaf27bce93d088c3f8cf715a2a6

    • Size

      98KB

    • MD5

      fd05bfc52fed79af0b2d06e3841c578d

    • SHA1

      4bee39b7d36f71f49fbc6eb702ef76102544ea36

    • SHA256

      af57c74d8a1eb56ce2647076959da9b933a7aeaf27bce93d088c3f8cf715a2a6

    • SHA512

      f2c81027c269f7bd3979532cd9f7168fbd0e5637919c8267184118cc93657ea248619fe9078496904466bc8c74372fe3eb19c4fda95dba7ad67ce28f1056c176

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks