General

  • Target

    aa10413b9e88d44e8eb76087d44e6ab5042db40def75108e5fe7dd6d2772c3a6

  • Size

    98KB

  • Sample

    210511-rftp3qhfns

  • MD5

    e8260ec52025c1d563a76f33328b50ac

  • SHA1

    e40c4b859f8ee266a0ed913e13ca47823fead1c4

  • SHA256

    aa10413b9e88d44e8eb76087d44e6ab5042db40def75108e5fe7dd6d2772c3a6

  • SHA512

    8b3d941e312187be624ebd1b05ce3f206df1e8b35a19491ef59596c5081dbdc8beb3b390a5fbac9de26c7ddc12d627ce8475c08b288bbf7d062b7061e6c58e60

Malware Config

Targets

    • Target

      aa10413b9e88d44e8eb76087d44e6ab5042db40def75108e5fe7dd6d2772c3a6

    • Size

      98KB

    • MD5

      e8260ec52025c1d563a76f33328b50ac

    • SHA1

      e40c4b859f8ee266a0ed913e13ca47823fead1c4

    • SHA256

      aa10413b9e88d44e8eb76087d44e6ab5042db40def75108e5fe7dd6d2772c3a6

    • SHA512

      8b3d941e312187be624ebd1b05ce3f206df1e8b35a19491ef59596c5081dbdc8beb3b390a5fbac9de26c7ddc12d627ce8475c08b288bbf7d062b7061e6c58e60

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks