General

  • Target

    6420fbc5ff2a03362c6a7b157988a5a4_JaffaCakes118

  • Size

    89KB

  • Sample

    241020-z6dp1s1bjh

  • MD5

    6420fbc5ff2a03362c6a7b157988a5a4

  • SHA1

    eb78921efa75a2d9d16fd1c7b49b9c7924c5553b

  • SHA256

    08c70aff79328790b475f330afa42fbe26bd0140ad81f9d419f337d6431fadf3

  • SHA512

    97c8dbfbf08506f851e772c8a2f73103c2eb735ad1c19ab1f75d79e225e1e9baa79831be92503beb18afdd442f3b4f0f85b8ab109e3e6f7989f76e432757a857

  • SSDEEP

    1536:XL+mFM2HXKZgiwIksu+XM5/HtAQ9JB9p03:7+4MOIkLZJNAQ9JBjq

Malware Config

Targets

    • Target

      6420fbc5ff2a03362c6a7b157988a5a4_JaffaCakes118

    • Size

      89KB

    • MD5

      6420fbc5ff2a03362c6a7b157988a5a4

    • SHA1

      eb78921efa75a2d9d16fd1c7b49b9c7924c5553b

    • SHA256

      08c70aff79328790b475f330afa42fbe26bd0140ad81f9d419f337d6431fadf3

    • SHA512

      97c8dbfbf08506f851e772c8a2f73103c2eb735ad1c19ab1f75d79e225e1e9baa79831be92503beb18afdd442f3b4f0f85b8ab109e3e6f7989f76e432757a857

    • SSDEEP

      1536:XL+mFM2HXKZgiwIksu+XM5/HtAQ9JB9p03:7+4MOIkLZJNAQ9JBjq

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks