General

  • Target

    982afc78ffa5b83966a8df8eb825b235_JaffaCakes118

  • Size

    34KB

  • Sample

    240402-1r444aef3w

  • MD5

    982afc78ffa5b83966a8df8eb825b235

  • SHA1

    59899ffeae9f397d13f82619ee957b7c9bf69e6d

  • SHA256

    424a31f4208711dd933978debbc35ee002a9ab37242eb8834b8c89b1163b14d5

  • SHA512

    39230efb479a09fd90e0ff5fb2e5122df26af239dc18df8d269743a0e419eebf7be2d4e3eefbd0d77cdbed2691da70fa3ec83c2274d459d66b5218c35e426572

  • SSDEEP

    768:kp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:kpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      982afc78ffa5b83966a8df8eb825b235_JaffaCakes118

    • Size

      34KB

    • MD5

      982afc78ffa5b83966a8df8eb825b235

    • SHA1

      59899ffeae9f397d13f82619ee957b7c9bf69e6d

    • SHA256

      424a31f4208711dd933978debbc35ee002a9ab37242eb8834b8c89b1163b14d5

    • SHA512

      39230efb479a09fd90e0ff5fb2e5122df26af239dc18df8d269743a0e419eebf7be2d4e3eefbd0d77cdbed2691da70fa3ec83c2274d459d66b5218c35e426572

    • SSDEEP

      768:kp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:kpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks