General

  • Target

    ce20647f8023b8a36bad173299e5ec45_JaffaCakes118

  • Size

    58KB

  • Sample

    240905-26nakatcrj

  • MD5

    ce20647f8023b8a36bad173299e5ec45

  • SHA1

    af418c58a1b52dee92849e4781d80708a7463d72

  • SHA256

    e45c52c8115e6d396504667f7dfda58c55760eced8847ad4938c77e6128323f8

  • SHA512

    e96bb1a5b45b30240972f0ba6d0e3af04017d3547008975fcac0854b02b51810270a1a54f90b7e796fcb328277843b9ac960644bc11e54c5db0960d6494ccad0

  • SSDEEP

    768:xebIhTafnlVvBTrIJrZ23WUyfIIhTaLuihG1gfFNsHWP4jBS:0zJTrIJroIM4gfFi2+A

Malware Config

Targets

    • Target

      ce20647f8023b8a36bad173299e5ec45_JaffaCakes118

    • Size

      58KB

    • MD5

      ce20647f8023b8a36bad173299e5ec45

    • SHA1

      af418c58a1b52dee92849e4781d80708a7463d72

    • SHA256

      e45c52c8115e6d396504667f7dfda58c55760eced8847ad4938c77e6128323f8

    • SHA512

      e96bb1a5b45b30240972f0ba6d0e3af04017d3547008975fcac0854b02b51810270a1a54f90b7e796fcb328277843b9ac960644bc11e54c5db0960d6494ccad0

    • SSDEEP

      768:xebIhTafnlVvBTrIJrZ23WUyfIIhTaLuihG1gfFNsHWP4jBS:0zJTrIJroIM4gfFi2+A

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks