General

  • Target

    JaffaCakes118_21348879a9af9065c17c64952c2d2ffb

  • Size

    34KB

  • Sample

    241231-rmpn6swqak

  • MD5

    21348879a9af9065c17c64952c2d2ffb

  • SHA1

    d332e37c917a865b2ecbdb0d4ccf285b430a21ba

  • SHA256

    d5f1c0f6a5b9c1cd7e220f62cd8ae84e8d45d93eb957cf67c5a0a55fb1519792

  • SHA512

    c9515335412e9c098ccdcad8e3a9ba1b7616bea915f45ab49de680cd1155cdd98dca78cf34bfcc62caced400b117ddda379efc8e3fc34253371eb33b5c9c81fb

  • SSDEEP

    768:zp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:zpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_21348879a9af9065c17c64952c2d2ffb

    • Size

      34KB

    • MD5

      21348879a9af9065c17c64952c2d2ffb

    • SHA1

      d332e37c917a865b2ecbdb0d4ccf285b430a21ba

    • SHA256

      d5f1c0f6a5b9c1cd7e220f62cd8ae84e8d45d93eb957cf67c5a0a55fb1519792

    • SHA512

      c9515335412e9c098ccdcad8e3a9ba1b7616bea915f45ab49de680cd1155cdd98dca78cf34bfcc62caced400b117ddda379efc8e3fc34253371eb33b5c9c81fb

    • SSDEEP

      768:zp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:zpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks