General

  • Target

    c0b717edabb4e5ef8f7b648bea21bf39f6a33966f596d432c6f2c40684aef0d1

  • Size

    128KB

  • Sample

    210513-9jjegcmq26

  • MD5

    bcaf9b6c070ec54cea97c5bf6033b2d6

  • SHA1

    a3ff666fd3f884c34a93dbb53e39cf02c3eab61d

  • SHA256

    c0b717edabb4e5ef8f7b648bea21bf39f6a33966f596d432c6f2c40684aef0d1

  • SHA512

    c3c9ac31c28d3d783255aa7c6f0ed4159c694b5c9bcd7a5461d00cfb80bee085bf466daef757179abb50c93be08293e7d627621021c902fcf85433655b92b1c9

Malware Config

Targets

    • Target

      c0b717edabb4e5ef8f7b648bea21bf39f6a33966f596d432c6f2c40684aef0d1

    • Size

      128KB

    • MD5

      bcaf9b6c070ec54cea97c5bf6033b2d6

    • SHA1

      a3ff666fd3f884c34a93dbb53e39cf02c3eab61d

    • SHA256

      c0b717edabb4e5ef8f7b648bea21bf39f6a33966f596d432c6f2c40684aef0d1

    • SHA512

      c3c9ac31c28d3d783255aa7c6f0ed4159c694b5c9bcd7a5461d00cfb80bee085bf466daef757179abb50c93be08293e7d627621021c902fcf85433655b92b1c9

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks