General

  • Target

    871262eccb223ab98ea9d3562912965a_JaffaCakes118

  • Size

    160KB

  • Sample

    241102-xgakysvngm

  • MD5

    871262eccb223ab98ea9d3562912965a

  • SHA1

    7859a9dbff57bebe88865ef8d036426247457068

  • SHA256

    b5fa9a08ad2bbf6f1fb963f3476bdd2de8896d29611fc3f2938f85e3788c6b18

  • SHA512

    b632d8b37d0b09bc0310ab78974c9d7b19bd867470e3d4dbe7c8a847c4ced0021372880c1716db1c2e6dcc8511ab7bea91a03fe3c56b9ec6c74b201f5b920e48

  • SSDEEP

    1536:BEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:KY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      871262eccb223ab98ea9d3562912965a_JaffaCakes118

    • Size

      160KB

    • MD5

      871262eccb223ab98ea9d3562912965a

    • SHA1

      7859a9dbff57bebe88865ef8d036426247457068

    • SHA256

      b5fa9a08ad2bbf6f1fb963f3476bdd2de8896d29611fc3f2938f85e3788c6b18

    • SHA512

      b632d8b37d0b09bc0310ab78974c9d7b19bd867470e3d4dbe7c8a847c4ced0021372880c1716db1c2e6dcc8511ab7bea91a03fe3c56b9ec6c74b201f5b920e48

    • SSDEEP

      1536:BEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:KY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks