General

  • Target

    9f3c090861e8bb00de175170b4b4bf13_JaffaCakes118

  • Size

    160KB

  • Sample

    241126-cln9paymax

  • MD5

    9f3c090861e8bb00de175170b4b4bf13

  • SHA1

    f4b23a1060de05c2e4a682bb61384fe6ff84ac05

  • SHA256

    766e2a8564cec4e592d714901f6066cf0024870dfbc162b4594f6ef6aa641680

  • SHA512

    2fb0453ebcd94fe5ab6e984d43322b60638615c64bc63c2c8bbda5197bfd015aed981b64387b5b7849bbe39d605ec7e8d9a490ede6270583d3bed14b86114f21

  • SSDEEP

    1536:zEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:wY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      9f3c090861e8bb00de175170b4b4bf13_JaffaCakes118

    • Size

      160KB

    • MD5

      9f3c090861e8bb00de175170b4b4bf13

    • SHA1

      f4b23a1060de05c2e4a682bb61384fe6ff84ac05

    • SHA256

      766e2a8564cec4e592d714901f6066cf0024870dfbc162b4594f6ef6aa641680

    • SHA512

      2fb0453ebcd94fe5ab6e984d43322b60638615c64bc63c2c8bbda5197bfd015aed981b64387b5b7849bbe39d605ec7e8d9a490ede6270583d3bed14b86114f21

    • SSDEEP

      1536:zEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:wY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks