General

  • Target

    e5403e4e226cb01bfcc853abead128ea_JaffaCakes118

  • Size

    131KB

  • Sample

    241212-hx74tstpgs

  • MD5

    e5403e4e226cb01bfcc853abead128ea

  • SHA1

    b6639a91758cc1d550b9bf8417c4c0ae5f686ab4

  • SHA256

    8ddabe3e4b22dd83515e572b821fafcd678892fb0c02db95c2ad962be24c81e3

  • SHA512

    25ee50e15f1073509e411be0044386faff032442d0e3e77938e7aad582214a2e4640cabd38c73680a9aa0d9d2e3cea97e7d25688b6ac191244dd2f53f0ea57d8

  • SSDEEP

    1536:/Px+riFFG1A/m3wE/iVP9In2Zv4qjh+rmKK4cVSZj:FY8FE/MVIn2Z5jgq54c4d

Malware Config

Targets

    • Target

      e5403e4e226cb01bfcc853abead128ea_JaffaCakes118

    • Size

      131KB

    • MD5

      e5403e4e226cb01bfcc853abead128ea

    • SHA1

      b6639a91758cc1d550b9bf8417c4c0ae5f686ab4

    • SHA256

      8ddabe3e4b22dd83515e572b821fafcd678892fb0c02db95c2ad962be24c81e3

    • SHA512

      25ee50e15f1073509e411be0044386faff032442d0e3e77938e7aad582214a2e4640cabd38c73680a9aa0d9d2e3cea97e7d25688b6ac191244dd2f53f0ea57d8

    • SSDEEP

      1536:/Px+riFFG1A/m3wE/iVP9In2Zv4qjh+rmKK4cVSZj:FY8FE/MVIn2Z5jgq54c4d

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks