General

  • Target

    8514731ad390d58d3fddebb224a51e56_JaffaCakes118

  • Size

    44KB

  • Sample

    241102-mxgdbs1qbx

  • MD5

    8514731ad390d58d3fddebb224a51e56

  • SHA1

    3c7e9d9cc1ccd79f651ce3c3e744e2ceb31e50e2

  • SHA256

    b17d531900420bf97fac3d5fb5405aeb85942d842dbb36312e7252692f3ec27c

  • SHA512

    57aac21221efc337673f4d192a34705b57959566485f6a5b9e05960540353bdcd0b593ae1e31c0f3d81337124129c6e1de616a8023e7017dfacc21a1c0e4c46f

  • SSDEEP

    768:ja+vOyMD5oQ/cXK+dbFg1TGAN2RUqZxbhxEll7j0MLlH:ja+vM4ld+TR26qZxbhO3IM

Malware Config

Targets

    • Target

      8514731ad390d58d3fddebb224a51e56_JaffaCakes118

    • Size

      44KB

    • MD5

      8514731ad390d58d3fddebb224a51e56

    • SHA1

      3c7e9d9cc1ccd79f651ce3c3e744e2ceb31e50e2

    • SHA256

      b17d531900420bf97fac3d5fb5405aeb85942d842dbb36312e7252692f3ec27c

    • SHA512

      57aac21221efc337673f4d192a34705b57959566485f6a5b9e05960540353bdcd0b593ae1e31c0f3d81337124129c6e1de616a8023e7017dfacc21a1c0e4c46f

    • SSDEEP

      768:ja+vOyMD5oQ/cXK+dbFg1TGAN2RUqZxbhxEll7j0MLlH:ja+vM4ld+TR26qZxbhO3IM

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks