General

  • Target

    0e88c93dfda9d61dbebdc07676592a9e_JaffaCakes118

  • Size

    160KB

  • Sample

    241003-h24l7s1crr

  • MD5

    0e88c93dfda9d61dbebdc07676592a9e

  • SHA1

    a6af1789f99ea7dee27e6ce2b57ac5b454e25bb5

  • SHA256

    d2a19b408ee53d613782354ca8d512fafc40447c43a099e9d1140c9c2275c5fb

  • SHA512

    7c851ace5f590d3db5e7463877c2b49a8b0548de46ba37e8c15264deb8860a3007a64b171d4a27d8239d58047b25ad6fc5461003001ea6bc931581023bf4f556

  • SSDEEP

    1536:REY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:aY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      0e88c93dfda9d61dbebdc07676592a9e_JaffaCakes118

    • Size

      160KB

    • MD5

      0e88c93dfda9d61dbebdc07676592a9e

    • SHA1

      a6af1789f99ea7dee27e6ce2b57ac5b454e25bb5

    • SHA256

      d2a19b408ee53d613782354ca8d512fafc40447c43a099e9d1140c9c2275c5fb

    • SHA512

      7c851ace5f590d3db5e7463877c2b49a8b0548de46ba37e8c15264deb8860a3007a64b171d4a27d8239d58047b25ad6fc5461003001ea6bc931581023bf4f556

    • SSDEEP

      1536:REY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:aY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks