General

  • Target

    JaffaCakes118_5e568e602022cfdf3115b799366f737d

  • Size

    34KB

  • Sample

    250101-v66zcaxqcl

  • MD5

    5e568e602022cfdf3115b799366f737d

  • SHA1

    ef429fe7b0e7e7b592737b49bbd5c2660c38ef7e

  • SHA256

    2d40f3b0bc7abb34abea91904e7fb02a291ad1e1c3c28fae11dc0d31ede69b49

  • SHA512

    ea732f652bd1cc7ba8e38e4f851a3f4a70ac5a539036eee2edeb05c494fe86b247e84a0ca66cf88abdf9027ec4a9384edc1cfe12e5987e0c4bea740365397ed4

  • SSDEEP

    768:up22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:upYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_5e568e602022cfdf3115b799366f737d

    • Size

      34KB

    • MD5

      5e568e602022cfdf3115b799366f737d

    • SHA1

      ef429fe7b0e7e7b592737b49bbd5c2660c38ef7e

    • SHA256

      2d40f3b0bc7abb34abea91904e7fb02a291ad1e1c3c28fae11dc0d31ede69b49

    • SHA512

      ea732f652bd1cc7ba8e38e4f851a3f4a70ac5a539036eee2edeb05c494fe86b247e84a0ca66cf88abdf9027ec4a9384edc1cfe12e5987e0c4bea740365397ed4

    • SSDEEP

      768:up22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:upYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks