General

  • Target

    JaffaCakes118_2e13031ac8a85e98906a128c1940ad60

  • Size

    89KB

  • Sample

    241231-ww55qssncs

  • MD5

    2e13031ac8a85e98906a128c1940ad60

  • SHA1

    a8de1a07503fd9111fe44c7025d8f6b31841345a

  • SHA256

    8f18579f0105ed8a536d420890a2a021645d1701c612bdf751e97c18d3d8b35e

  • SHA512

    fb5b11a82aba95d049dcbe95daeefe79011dae40dd088d012175fcc706ba3c55d2fabf476143f5f6f4d6bb248b1898ca5d091ca51057df38eafc45aca7fb4367

  • SSDEEP

    1536:Ur+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:W+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_2e13031ac8a85e98906a128c1940ad60

    • Size

      89KB

    • MD5

      2e13031ac8a85e98906a128c1940ad60

    • SHA1

      a8de1a07503fd9111fe44c7025d8f6b31841345a

    • SHA256

      8f18579f0105ed8a536d420890a2a021645d1701c612bdf751e97c18d3d8b35e

    • SHA512

      fb5b11a82aba95d049dcbe95daeefe79011dae40dd088d012175fcc706ba3c55d2fabf476143f5f6f4d6bb248b1898ca5d091ca51057df38eafc45aca7fb4367

    • SSDEEP

      1536:Ur+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:W+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks