General

  • Target

    52a729fa4f6d62122027682058bb8722eb17adaf207bb4a1e9471537c85267e3

  • Size

    98KB

  • Sample

    210511-j7yv1qqvr6

  • MD5

    d5cf9f98ecc83ab402b1b975cc38203b

  • SHA1

    e2bffdab60e0bf9c5ef91dfeeb8f4a1b79b69e2e

  • SHA256

    52a729fa4f6d62122027682058bb8722eb17adaf207bb4a1e9471537c85267e3

  • SHA512

    8883e65feb95d955978e48a2c8dfc701eb371bdc7268e43e8aa3ea36e49939f4dea54333515ce6b4987169d39864ba05553f5b56c48ca4256d3fde42b8daa89b

Malware Config

Targets

    • Target

      52a729fa4f6d62122027682058bb8722eb17adaf207bb4a1e9471537c85267e3

    • Size

      98KB

    • MD5

      d5cf9f98ecc83ab402b1b975cc38203b

    • SHA1

      e2bffdab60e0bf9c5ef91dfeeb8f4a1b79b69e2e

    • SHA256

      52a729fa4f6d62122027682058bb8722eb17adaf207bb4a1e9471537c85267e3

    • SHA512

      8883e65feb95d955978e48a2c8dfc701eb371bdc7268e43e8aa3ea36e49939f4dea54333515ce6b4987169d39864ba05553f5b56c48ca4256d3fde42b8daa89b

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks