General

  • Target

    c9b082d69fac96fb4f51f02c3dcf54b9_JaffaCakes118

  • Size

    46KB

  • Sample

    240829-1j2n1asgmb

  • MD5

    c9b082d69fac96fb4f51f02c3dcf54b9

  • SHA1

    e67896fecff9e8aff5f94d1b7391f07035a9ce4d

  • SHA256

    032d93c2d20ce8e13e0f3ae0666709a9d8d2f1c6be720bd0d2d4bc60a825bdf2

  • SHA512

    fc101b044efd23e3b9fdd239852321822fbfc8d2a24ad7b905f79ed46fb6181cd0865e30f1ea4f3ab9b375c72c29a7aa95b6e6783ab2ae64b1ca64c6f819ca2d

  • SSDEEP

    768:9twyMe0Jy8xwd117mrlI9m/xGuv4V7RMEnqt9jn2ACH3hLZ2HwCLlH:9twyedxwr1qUMv4VV6j2A83hVY

Malware Config

Targets

    • Target

      c9b082d69fac96fb4f51f02c3dcf54b9_JaffaCakes118

    • Size

      46KB

    • MD5

      c9b082d69fac96fb4f51f02c3dcf54b9

    • SHA1

      e67896fecff9e8aff5f94d1b7391f07035a9ce4d

    • SHA256

      032d93c2d20ce8e13e0f3ae0666709a9d8d2f1c6be720bd0d2d4bc60a825bdf2

    • SHA512

      fc101b044efd23e3b9fdd239852321822fbfc8d2a24ad7b905f79ed46fb6181cd0865e30f1ea4f3ab9b375c72c29a7aa95b6e6783ab2ae64b1ca64c6f819ca2d

    • SSDEEP

      768:9twyMe0Jy8xwd117mrlI9m/xGuv4V7RMEnqt9jn2ACH3hLZ2HwCLlH:9twyedxwr1qUMv4VV6j2A83hVY

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks