General

  • Target

    JaffaCakes118_268140c55f4c31cf0873a151ca3e0eac

  • Size

    34KB

  • Sample

    241231-td4svazngq

  • MD5

    268140c55f4c31cf0873a151ca3e0eac

  • SHA1

    58ab5c2a79467ece4585d6b96c62b63ba010ee93

  • SHA256

    9b615f38bba336dc42c27684b19119780acb7e7c7f5a200f6f75cb5feedcd27d

  • SHA512

    0b8b738a96c5808478f4ddf950bea015f8a8a745ee5ce8d120b5465531dc1237cdf5261ab450b97d7e4c2060751157bf8fff4f712c979bc9ec3121871ed94f8b

  • SSDEEP

    768:cp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JX:cpYoX58z1uirL98xMWnT0OQ9JX

Malware Config

Targets

    • Target

      JaffaCakes118_268140c55f4c31cf0873a151ca3e0eac

    • Size

      34KB

    • MD5

      268140c55f4c31cf0873a151ca3e0eac

    • SHA1

      58ab5c2a79467ece4585d6b96c62b63ba010ee93

    • SHA256

      9b615f38bba336dc42c27684b19119780acb7e7c7f5a200f6f75cb5feedcd27d

    • SHA512

      0b8b738a96c5808478f4ddf950bea015f8a8a745ee5ce8d120b5465531dc1237cdf5261ab450b97d7e4c2060751157bf8fff4f712c979bc9ec3121871ed94f8b

    • SSDEEP

      768:cp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9JX:cpYoX58z1uirL98xMWnT0OQ9JX

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks