General

  • Target

    9eca83ab4bf249290197f6c476e203c9_JaffaCakes118

  • Size

    160KB

  • Sample

    240816-r4457azglh

  • MD5

    9eca83ab4bf249290197f6c476e203c9

  • SHA1

    5a19eefe171a6d94198dbc1e02504755db85ced1

  • SHA256

    d6afaf4999a07efef910e972099ed34ec0e40b32fb91dd5ae9690ac0ef311a70

  • SHA512

    ffff57551b6fba953058616508910f8eb3a5ad541a320cf6ff01fb37ef0da52c44547e22ae626a77f0553fb407eef7130b552f0f6038b3811e05cfb0da6036f8

  • SSDEEP

    1536:iEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:pY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      9eca83ab4bf249290197f6c476e203c9_JaffaCakes118

    • Size

      160KB

    • MD5

      9eca83ab4bf249290197f6c476e203c9

    • SHA1

      5a19eefe171a6d94198dbc1e02504755db85ced1

    • SHA256

      d6afaf4999a07efef910e972099ed34ec0e40b32fb91dd5ae9690ac0ef311a70

    • SHA512

      ffff57551b6fba953058616508910f8eb3a5ad541a320cf6ff01fb37ef0da52c44547e22ae626a77f0553fb407eef7130b552f0f6038b3811e05cfb0da6036f8

    • SSDEEP

      1536:iEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:pY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks