General

  • Target

    JaffaCakes118_5a97d7b03b718441c0ffe79f9b03175b

  • Size

    89KB

  • Sample

    250101-s17mkstjfl

  • MD5

    5a97d7b03b718441c0ffe79f9b03175b

  • SHA1

    746621849c1d0341a2ad5dfc015167a576814e23

  • SHA256

    dc8c35f9f4d44e4a7ef7ae445b7f016e5d208894deeed047dcaa5e7fc4faa401

  • SHA512

    d598cbd72d9d23a7c46d5dd693922e51dc690b593b233d3bf277206e1e028a52527574a9355e64e50fff126f4e98364de0c79da1d68c80786fa7512182f64849

  • SSDEEP

    1536:Hr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:L+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_5a97d7b03b718441c0ffe79f9b03175b

    • Size

      89KB

    • MD5

      5a97d7b03b718441c0ffe79f9b03175b

    • SHA1

      746621849c1d0341a2ad5dfc015167a576814e23

    • SHA256

      dc8c35f9f4d44e4a7ef7ae445b7f016e5d208894deeed047dcaa5e7fc4faa401

    • SHA512

      d598cbd72d9d23a7c46d5dd693922e51dc690b593b233d3bf277206e1e028a52527574a9355e64e50fff126f4e98364de0c79da1d68c80786fa7512182f64849

    • SSDEEP

      1536:Hr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:L+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks