General

  • Target

    990c8f86de2171c0296ee222d7bf1a43efaec8a0653a6c042579b1317b55564f

  • Size

    98KB

  • Sample

    210511-mbq6556dln

  • MD5

    ee51ef645f1a1b2915d486577670912a

  • SHA1

    52f35e0ce3c11a0cae937cf24b58f42b5bd819b0

  • SHA256

    990c8f86de2171c0296ee222d7bf1a43efaec8a0653a6c042579b1317b55564f

  • SHA512

    6f84dad1d70750d380221d9630d8f72756ee2f4cbb31838a9c726c3f89036e7f314572f2ada660fe7313e785991cf5ae19f41c83f7b3e58df157b28959b1b4f0

Malware Config

Targets

    • Target

      990c8f86de2171c0296ee222d7bf1a43efaec8a0653a6c042579b1317b55564f

    • Size

      98KB

    • MD5

      ee51ef645f1a1b2915d486577670912a

    • SHA1

      52f35e0ce3c11a0cae937cf24b58f42b5bd819b0

    • SHA256

      990c8f86de2171c0296ee222d7bf1a43efaec8a0653a6c042579b1317b55564f

    • SHA512

      6f84dad1d70750d380221d9630d8f72756ee2f4cbb31838a9c726c3f89036e7f314572f2ada660fe7313e785991cf5ae19f41c83f7b3e58df157b28959b1b4f0

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks