General

  • Target

    21970f9e5b73c8538f2fa30dcd8204d3_JaffaCakes118

  • Size

    46KB

  • Sample

    241008-pxz7js1ela

  • MD5

    21970f9e5b73c8538f2fa30dcd8204d3

  • SHA1

    5dc4b7223d7e274d2a3fa0b8988266f5aa4ad1f1

  • SHA256

    158a86c099c2fa529f2fd965e7987ada4d82f623943a57aa999147cd6cc27921

  • SHA512

    f111f20e09cd274a1e98e81681a815c4d64eedf80afff0de6c12f426a1ab5d594915b1da203f31ed51c1b9f680d5a92b4da62d27f919a60cd2493b889f68a456

  • SSDEEP

    768:6twyMe0Jy8xwd117mrlI9m/xGuv4V7RMEnqt9jn2ACH3hLZ2HwCLlH:6twyedxwr1qUMv4VV6j2A83hVY

Malware Config

Targets

    • Target

      21970f9e5b73c8538f2fa30dcd8204d3_JaffaCakes118

    • Size

      46KB

    • MD5

      21970f9e5b73c8538f2fa30dcd8204d3

    • SHA1

      5dc4b7223d7e274d2a3fa0b8988266f5aa4ad1f1

    • SHA256

      158a86c099c2fa529f2fd965e7987ada4d82f623943a57aa999147cd6cc27921

    • SHA512

      f111f20e09cd274a1e98e81681a815c4d64eedf80afff0de6c12f426a1ab5d594915b1da203f31ed51c1b9f680d5a92b4da62d27f919a60cd2493b889f68a456

    • SSDEEP

      768:6twyMe0Jy8xwd117mrlI9m/xGuv4V7RMEnqt9jn2ACH3hLZ2HwCLlH:6twyedxwr1qUMv4VV6j2A83hVY

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks