TinyPosh

Description

(Group-IB) As in the first campaigns, opening the link in the email resulted in the TinyPosh Trojan being downloaded to the victim’s computer. The malware achieved persistence in the system, obtained privileges of the account from which the Trojan was launched, and could download and launch the Cobalt Strike Beacon upon command. To hide the real C&C address, the hackers used the Cloudflare Workers server.

Names

Name
TinyPosh

Category

Malware

Type

  • Backdoor
  • Downloader
  • Loader

Information

Other Information

Uuid

2b67075b-19be-441c-860b-aab17bcd21b6

Last Card Change

2020-10-19