General

  • Target

    01b4287c468502a97e34b0f9deb8ca113f86d3870cef67390358220769757038

  • Size

    160KB

  • Sample

    210513-kqnmcph1ha

  • MD5

    b56edfa01d93e4dbc0dbc7bcc8884739

  • SHA1

    d4d5710381fa17bac4548ee419c3f67133684ac8

  • SHA256

    01b4287c468502a97e34b0f9deb8ca113f86d3870cef67390358220769757038

  • SHA512

    4c01e194d20b90f50250d8225aea069b3249fe9650b6500299559a7cd3502ca7988b1571fec88ebbb2523cda2550f93b729293a033bfbea99911786e009b5eb2

Malware Config

Targets

    • Target

      01b4287c468502a97e34b0f9deb8ca113f86d3870cef67390358220769757038

    • Size

      160KB

    • MD5

      b56edfa01d93e4dbc0dbc7bcc8884739

    • SHA1

      d4d5710381fa17bac4548ee419c3f67133684ac8

    • SHA256

      01b4287c468502a97e34b0f9deb8ca113f86d3870cef67390358220769757038

    • SHA512

      4c01e194d20b90f50250d8225aea069b3249fe9650b6500299559a7cd3502ca7988b1571fec88ebbb2523cda2550f93b729293a033bfbea99911786e009b5eb2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks