Carbanak/ FIN7 Crime Gang Threat Intel Advisory

CloudSEK threat intelligence advisory on Carbanak/ FIN7 threat group, targets banks for espionage, data exfiltration, using Carbanak malware.
Updated on
April 19, 2023
Published on
December 14, 2020
Subscribe to the latest industry news, threats and resources.
Advisory Type
Adversary Intelligence
Threat Actors
IoCs , TTPs
Carbanak is a threat group that mainly targets banks for espionage and data exfiltration. The malware associated with this group is also referred to as the “Carbanak”. This financially motivated threat group, dubbed as FIN7, reportedly uses the Carbanak malware in their campaigns, especially in the post exploitation phase. The group uses valid digital certificates for code signing the carbanak payload, to prove their integrity, thereby evading traditional anti-malware defenses.  

Indicators of Compromise

1. MD5
  • 44a70bdd3dc9af38103d562d29023882
  • 25617ce39e035e60fa0d71c2c28e1bf5
  • c99c03a1ef6bc783bb6e534476e5155
  • e741daf57eb00201f3e447ef2426142f
  • 1e47e12d11580e935878b0ed78d2294f
  • ddc9b71808be3a0e180e2befae4ff433
  • 6b51c476e9cae2a88777ee330b639166
  • 8b3a91038ecb2f57de5bbd29848b6dc4
  • 9f01b74c1ae1c407eb148c6b13850d28
  • 1284a97c9257513aaebe708ac82c2e38
  • 5ecb9eb63e8ace126f20de7d139dafe8
  • 07b5472d347d42780469fb2654b7fc54
  • 80dd3bd472624a01e5dff9e015ed74fd
  • eafba59cafa0e4fa350dfd3144e02446
  • 2e2bc95337c3b8eb05467e0049124027
  • 608b8bc44a59e2d5c6bf0c5ee5e1f517
  • 370d420948672e04ba8eac10bfe6fc9c
  • 7396ce1f93c8f7dd526eeafaf87f9c2e
  • 2e7eec2c3e7ba29fbf3789a788b4228e
  • 732e6d3d7534da31f51b25506e52227a
  • f6207d7460a0fbddc2c32c60191b6634
  • 970056273f112900c81725137f9f8b45
  • 81e6ebbfa5b3cca1c38be969510fae07
  • b789b368b21d3d99504e6eb11a6d6111
  • b57dc2bc16dfdb3de55923aef9a98401
  • b6cb3301099e4b93902c3b59dcabb030
  • 17c39e9611777b3bcf6d289ce02f42a1
  • ad94fa5c9ff3adcdc03a1ad32cee0e3a
  • 450605b6761ff8dd025978f44724b11e0c5eadcc
  • 54074b3934955d4121d1a01fe2ed5493c3f7f16d
  • 37de1791dca31f1ef85a4246d51702b0352def6d
  • 8230e932427bfd4c2494a6e0269056535b9e6604
  • 996db927eb4392660fac078f1b3b20306618f382
  • 33ee104ab2c9fc37c067a26623e7fddd3bb76302
  • 1d3501b30183ba213fb4c22a00d89db6fd50cc34
2. Domains
3. IP

FIN7 Tactics, Techniques and Procedures

Initial Access Spear Phishing Attachment (T1566.001)
Execution Component Object Model and Distributed COM (T1021.003) Execution through API (T0871) PowerShell (T1059.001) Service Execution (T1569.002) User Execution (T1204) Windows Management Instrumentation (T1047)
Persistence New Service (T1543.003) Registry Run Keys / StartupFolder (T1547) Valid Accounts (T1078)
Privilege Escalation Bypass User Account Control (T1548) New Service (T1543.003) Valid Accounts (T1078)
Defense Evasion Code Signing (T1553) Deobfuscate/Decode Files or Information (T1140) Masquerading (T1036) Obfuscated Files or Information (T1027) Process Injection (T1055) Software Packing (T1027)
Credential Access Credential Dumping (T1003) Input Capture (T1056)
Discovery Application Window Discovery (T1010) Process Discovery (T1057) Remote System Discovery (T1018) System Network ConfigurationDiscovery (T1016) System Owner/User Discovery (T1033)
Lateral Movement Remote Desktop Protocol (T1021.001) Windows Admin Shares (T1021.002)
Collection Data from Local System (T1005) Input Capture (T1056) Screen Capture (T1113)
Command & Control (C2) Commonly Used Port (T1436) Connection Proxy (T1090) Standard Application LayerProtocol (T1071) Standard Cryptographic Protocol (T1521)
Exfiltration Exfiltration Over Command andControl Channel (T1041)

Get Global Threat Intelligence on Real Time

Protect your business from cyber threats with real-time global threat intelligence data.. 30-day free and No Commitment Trial.
Schedule a Demo
Real time Threat Intelligence Data
More information and context about Underground Chatter
On-Demand Research Services
Dashboard mockup
Global Threat Intelligence Feed

Protect and proceed with Actionable Intelligence

The Global Cyber Threat Intelligence Feed is an innovative platform that gathers information from various sources to help businesses and organizations stay ahead of potential cyber-attacks. This feed provides real-time updates on cyber threats, including malware, phishing scams, and other forms of cybercrime.
Trusted by 400+ Top organisations