General

  • Target

    a095ebd8c3fa0da0f3d91339b05a2090_JaffaCakes118

  • Size

    120KB

  • Sample

    241126-h9p4saxnbk

  • MD5

    a095ebd8c3fa0da0f3d91339b05a2090

  • SHA1

    9df4f404f194ecb98f893b43e835c0024373358d

  • SHA256

    38a0f8bb33531a039f988414296376e2168cb29117d4819769b83548426517e4

  • SHA512

    86f5f89f2d17bf7b599584ca3fe0c0cc9ada09acd2dd04aefdbd241bfae55e773809b2829573e7e999209cfcaef2eba75e2551c93f0a895039e8127f13de8d07

  • SSDEEP

    1536:zlwmNMSaNSl9GwySUulhjiJcnILQlt+1gH0Ut43+lYGZFFzwWTaa2:zlrNhawBUopiJcIsti3+8

Malware Config

Targets

    • Target

      a095ebd8c3fa0da0f3d91339b05a2090_JaffaCakes118

    • Size

      120KB

    • MD5

      a095ebd8c3fa0da0f3d91339b05a2090

    • SHA1

      9df4f404f194ecb98f893b43e835c0024373358d

    • SHA256

      38a0f8bb33531a039f988414296376e2168cb29117d4819769b83548426517e4

    • SHA512

      86f5f89f2d17bf7b599584ca3fe0c0cc9ada09acd2dd04aefdbd241bfae55e773809b2829573e7e999209cfcaef2eba75e2551c93f0a895039e8127f13de8d07

    • SSDEEP

      1536:zlwmNMSaNSl9GwySUulhjiJcnILQlt+1gH0Ut43+lYGZFFzwWTaa2:zlrNhawBUopiJcIsti3+8

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks