General

  • Target

    adb3599368dc2e40fb16f012c3c84b29_JaffaCakes118

  • Size

    46KB

  • Sample

    241128-1rnr4sxpcn

  • MD5

    adb3599368dc2e40fb16f012c3c84b29

  • SHA1

    a2af647b01acd1fa6e58f984a1f512d96b6689a8

  • SHA256

    37ff62b9af34949712b54237143407fcec787df6bd5085549877334d6109ebdd

  • SHA512

    a19707029af4eb8158ef753044d55f3537fefd02f4c86a8796e0127b51fe9c28a8b9555a26df4cfeae5e5da7fef2ed3cf7f7163cdbb39ff2d430c31dd7cfdcc2

  • SSDEEP

    768:8twyMe0Jy8xwd117mrlI9m/xGuv4V7RMEnqt9jn2ACH3hLZ2HwCLlH:8twyedxwr1qUMv4VV6j2A83hVY

Malware Config

Targets

    • Target

      adb3599368dc2e40fb16f012c3c84b29_JaffaCakes118

    • Size

      46KB

    • MD5

      adb3599368dc2e40fb16f012c3c84b29

    • SHA1

      a2af647b01acd1fa6e58f984a1f512d96b6689a8

    • SHA256

      37ff62b9af34949712b54237143407fcec787df6bd5085549877334d6109ebdd

    • SHA512

      a19707029af4eb8158ef753044d55f3537fefd02f4c86a8796e0127b51fe9c28a8b9555a26df4cfeae5e5da7fef2ed3cf7f7163cdbb39ff2d430c31dd7cfdcc2

    • SSDEEP

      768:8twyMe0Jy8xwd117mrlI9m/xGuv4V7RMEnqt9jn2ACH3hLZ2HwCLlH:8twyedxwr1qUMv4VV6j2A83hVY

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks