General

  • Target

    8eb076fcdcb9efd339b74ca8645b5395_JaffaCakes118

  • Size

    34KB

  • Sample

    240402-rfzkssce9z

  • MD5

    8eb076fcdcb9efd339b74ca8645b5395

  • SHA1

    21cee2de99dbe074b150fd67cf3874517e858994

  • SHA256

    522303d4aebf3cda8b60b4d427dffcd4a674f08d24cb009ae1efbc278af8a5de

  • SHA512

    aa638f371c7030c163e03eb64b7e1f9a4728f0f0f6414f99152d95e08cdcfd50c9cc052c2a475b855c5ebcf08d75a39f3cd1d45e745af9345682d42ced89c034

  • SSDEEP

    768:1p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:1pYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      8eb076fcdcb9efd339b74ca8645b5395_JaffaCakes118

    • Size

      34KB

    • MD5

      8eb076fcdcb9efd339b74ca8645b5395

    • SHA1

      21cee2de99dbe074b150fd67cf3874517e858994

    • SHA256

      522303d4aebf3cda8b60b4d427dffcd4a674f08d24cb009ae1efbc278af8a5de

    • SHA512

      aa638f371c7030c163e03eb64b7e1f9a4728f0f0f6414f99152d95e08cdcfd50c9cc052c2a475b855c5ebcf08d75a39f3cd1d45e745af9345682d42ced89c034

    • SSDEEP

      768:1p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:1pYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks