Resubmissions

29/03/2024, 09:03

240329-kz7besed84 10

General

  • Target

    1dfaf87d78285a452d2ecdc220a92427_JaffaCakes118

  • Size

    160KB

  • Sample

    240329-kz7besed84

  • MD5

    1dfaf87d78285a452d2ecdc220a92427

  • SHA1

    e587a0d113a3a0dc9711e413e42d697891a8b50b

  • SHA256

    2d6436bbf2f9bae4d6f5ff661cfc35e88feafc7d7c3fdf04b294e11e11fcc283

  • SHA512

    d1a653142c58400eb76d783c7b8011d4b86efc4cfa54e28f7d001574e1a9bb9e7bde1b7565b3f81654239aed67939fb0e70fcfeb6b7cff4a03f2ba3798f36061

  • SSDEEP

    1536:cEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:/Y+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      1dfaf87d78285a452d2ecdc220a92427_JaffaCakes118

    • Size

      160KB

    • MD5

      1dfaf87d78285a452d2ecdc220a92427

    • SHA1

      e587a0d113a3a0dc9711e413e42d697891a8b50b

    • SHA256

      2d6436bbf2f9bae4d6f5ff661cfc35e88feafc7d7c3fdf04b294e11e11fcc283

    • SHA512

      d1a653142c58400eb76d783c7b8011d4b86efc4cfa54e28f7d001574e1a9bb9e7bde1b7565b3f81654239aed67939fb0e70fcfeb6b7cff4a03f2ba3798f36061

    • SSDEEP

      1536:cEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:/Y+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Modifies Installed Components in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks