General

  • Target

    e6a7c4c68f583b72e1ca2bbf763202a91f2f27ac94824ee12725c913a9bc290a

  • Size

    98KB

  • Sample

    210511-h8p7gw7ns2

  • MD5

    b051edf677d794088e2ebcea7ac8584b

  • SHA1

    87a5b5aa6b06450ed2577a954c16cbc4841e4e03

  • SHA256

    e6a7c4c68f583b72e1ca2bbf763202a91f2f27ac94824ee12725c913a9bc290a

  • SHA512

    2bf5af01c3a1afa5eca839bdad0fa9ac0cd87466ce29cde52469843d262fcee4b9712d4478bfd9bec855d8f5b968720f6b3d4891683b5093a46560098d2f9771

Malware Config

Targets

    • Target

      e6a7c4c68f583b72e1ca2bbf763202a91f2f27ac94824ee12725c913a9bc290a

    • Size

      98KB

    • MD5

      b051edf677d794088e2ebcea7ac8584b

    • SHA1

      87a5b5aa6b06450ed2577a954c16cbc4841e4e03

    • SHA256

      e6a7c4c68f583b72e1ca2bbf763202a91f2f27ac94824ee12725c913a9bc290a

    • SHA512

      2bf5af01c3a1afa5eca839bdad0fa9ac0cd87466ce29cde52469843d262fcee4b9712d4478bfd9bec855d8f5b968720f6b3d4891683b5093a46560098d2f9771

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks