General

  • Target

    JaffaCakes118_2eea5a13c7b8bec2300a2d2f6905a14b

  • Size

    34KB

  • Sample

    241231-w67rbavrgk

  • MD5

    2eea5a13c7b8bec2300a2d2f6905a14b

  • SHA1

    31ed276ebdc48dd6532b066ce1cfa4c0b7dd937e

  • SHA256

    8e8643f384a788bca4808afc13e4e59ee8e75aa0d5279bf3b52d8f2d86340906

  • SHA512

    d6747ada8ed02ec6441fd475fab3347d2b19a47e5731a2429d06b08f735725734ec0cc4d6f05375b095d1a3e1a7a8cba4435dbb6941bf0561a7e0b2fb253cd2b

  • SSDEEP

    768:6p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:6pYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_2eea5a13c7b8bec2300a2d2f6905a14b

    • Size

      34KB

    • MD5

      2eea5a13c7b8bec2300a2d2f6905a14b

    • SHA1

      31ed276ebdc48dd6532b066ce1cfa4c0b7dd937e

    • SHA256

      8e8643f384a788bca4808afc13e4e59ee8e75aa0d5279bf3b52d8f2d86340906

    • SHA512

      d6747ada8ed02ec6441fd475fab3347d2b19a47e5731a2429d06b08f735725734ec0cc4d6f05375b095d1a3e1a7a8cba4435dbb6941bf0561a7e0b2fb253cd2b

    • SSDEEP

      768:6p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:6pYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks