TinyPosh
Description
(Group-IB) As in the first campaigns, opening the link in the email resulted in the TinyPosh Trojan being downloaded to the victim’s computer. The malware achieved persistence in the system, obtained privileges of the account from which the Trojan was launched, and could download and launch the Cobalt Strike Beacon upon command. To hide the real C&C address, the hackers used the Cloudflare Workers server.
Names
Name |
---|
TinyPosh |
Category
Malware
Type
- Backdoor
- Downloader
- Loader
Information
Other Information
Uuid
2b67075b-19be-441c-860b-aab17bcd21b6
Last Card Change
2020-10-19