General

  • Target

    d89427641ec57a9f387be2186e517822_JaffaCakes118

  • Size

    34KB

  • Sample

    240405-trcaraha89

  • MD5

    d89427641ec57a9f387be2186e517822

  • SHA1

    4d5a73bf353a65d85467aea24ef423ed61e3424f

  • SHA256

    f1781c854260eaedc023bb79ee4a3f1999f3684cfc9f94ce900852130406deeb

  • SHA512

    df962897bea62958b9b4bd3013406695f4be558ead229df372e0a4ba6499307199bb9a1ca5ff9f7a0dc7e8954a50715db34644e59657cafa006bcad53b43c169

  • SSDEEP

    768:vp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:vpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      d89427641ec57a9f387be2186e517822_JaffaCakes118

    • Size

      34KB

    • MD5

      d89427641ec57a9f387be2186e517822

    • SHA1

      4d5a73bf353a65d85467aea24ef423ed61e3424f

    • SHA256

      f1781c854260eaedc023bb79ee4a3f1999f3684cfc9f94ce900852130406deeb

    • SHA512

      df962897bea62958b9b4bd3013406695f4be558ead229df372e0a4ba6499307199bb9a1ca5ff9f7a0dc7e8954a50715db34644e59657cafa006bcad53b43c169

    • SSDEEP

      768:vp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:vpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks