General

  • Target

    93a2e5b7c0cef04ecdbc399c560a9327_JaffaCakes118

  • Size

    160KB

  • Sample

    241124-kqm67aymdk

  • MD5

    93a2e5b7c0cef04ecdbc399c560a9327

  • SHA1

    ba78b2500a45e2f223251ac0fac10db021d2c114

  • SHA256

    d2917f109d77179c312e758ad3cc68be9cd8cf3b23b41734adde0ff878454150

  • SHA512

    56b8b3e5f5555dfd4d1480703c32ff2e3cea4fa8f261f9113a41f68ee5167a71bd4d3556de556f12a40bf01f5bef275e6d875667f411615a62c611e6ac975513

  • SSDEEP

    1536:IEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:LY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      93a2e5b7c0cef04ecdbc399c560a9327_JaffaCakes118

    • Size

      160KB

    • MD5

      93a2e5b7c0cef04ecdbc399c560a9327

    • SHA1

      ba78b2500a45e2f223251ac0fac10db021d2c114

    • SHA256

      d2917f109d77179c312e758ad3cc68be9cd8cf3b23b41734adde0ff878454150

    • SHA512

      56b8b3e5f5555dfd4d1480703c32ff2e3cea4fa8f261f9113a41f68ee5167a71bd4d3556de556f12a40bf01f5bef275e6d875667f411615a62c611e6ac975513

    • SSDEEP

      1536:IEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:LY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks