General

  • Target

    004893a57869b82ea70e53418b2e45f0_JaffaCakes118

  • Size

    192KB

  • Sample

    240930-jwwj3stfpk

  • MD5

    004893a57869b82ea70e53418b2e45f0

  • SHA1

    433804ad25a8e1964e1f251c99f2265889d7da3b

  • SHA256

    e90ff20dc6b22d34c18780216a28b7e008fa51cd554f3a2ba40761ca1e0d1e2e

  • SHA512

    5a914e33ea36de79e93e97a00af412346ab04838bc97ce685f27494de6aaeb9e4507505215aa6609458b41b2d0d862c873cffdf5089f54eda498787b0a0bac39

  • SSDEEP

    3072:cjXRETz1DNkdrPFEzsSyZigCngANo6PcQQn8oM9r1UfIPgPyMx/L+FTIMLG1g5:cjXQiXS97Hy6UQQcrdgPJWBGe

Malware Config

Targets

    • Target

      004893a57869b82ea70e53418b2e45f0_JaffaCakes118

    • Size

      192KB

    • MD5

      004893a57869b82ea70e53418b2e45f0

    • SHA1

      433804ad25a8e1964e1f251c99f2265889d7da3b

    • SHA256

      e90ff20dc6b22d34c18780216a28b7e008fa51cd554f3a2ba40761ca1e0d1e2e

    • SHA512

      5a914e33ea36de79e93e97a00af412346ab04838bc97ce685f27494de6aaeb9e4507505215aa6609458b41b2d0d862c873cffdf5089f54eda498787b0a0bac39

    • SSDEEP

      3072:cjXRETz1DNkdrPFEzsSyZigCngANo6PcQQn8oM9r1UfIPgPyMx/L+FTIMLG1g5:cjXQiXS97Hy6UQQcrdgPJWBGe

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks