General

  • Target

    80f4ac522e4d863e580fd20604a71890.bin

  • Size

    58KB

  • Sample

    240602-bzszcsfa42

  • MD5

    80f4ac522e4d863e580fd20604a71890

  • SHA1

    daaf9f7c9d60b9b0959481d94a01d05099dc5847

  • SHA256

    09b7d02191ef724b6a1a0289a95e6ff3a378758f0d01b80fdaa688bda09f11f0

  • SHA512

    3543037a73b86470ecc00d7c06ee8288340072c354ee845d8b9c1195389337de612e2691ebbe2c9012fae19111fb0f0106b9147a8ba4f13dea05baa373163286

  • SSDEEP

    768:2NMbiFKoELVxrcCsUmWkpbrD7GpxkTIzQMBIm6aNGyUwq9JaTovtebSo:2WBoEcCsUVEbr+BZG1CutY

Malware Config

Targets

    • Target

      80f4ac522e4d863e580fd20604a71890.bin

    • Size

      58KB

    • MD5

      80f4ac522e4d863e580fd20604a71890

    • SHA1

      daaf9f7c9d60b9b0959481d94a01d05099dc5847

    • SHA256

      09b7d02191ef724b6a1a0289a95e6ff3a378758f0d01b80fdaa688bda09f11f0

    • SHA512

      3543037a73b86470ecc00d7c06ee8288340072c354ee845d8b9c1195389337de612e2691ebbe2c9012fae19111fb0f0106b9147a8ba4f13dea05baa373163286

    • SSDEEP

      768:2NMbiFKoELVxrcCsUmWkpbrD7GpxkTIzQMBIm6aNGyUwq9JaTovtebSo:2WBoEcCsUVEbr+BZG1CutY

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Tasks