General

  • Target

    JaffaCakes118_5cce134e385799449c59a9b14b30aa5c

  • Size

    34KB

  • Sample

    250101-vajtyawkap

  • MD5

    5cce134e385799449c59a9b14b30aa5c

  • SHA1

    096fde169c14661bc30701f290d52b857adfc426

  • SHA256

    807b96a97dfc75bfeb8a2da4ad3b0213612d2c698bd4ed42f63a911986e55add

  • SHA512

    197df59f44200d97efff26483fb2c7ee633992672f4bc51bdb6c27d46a46c483cb078d7374c23aa55f1eab1ef2d1a6e5c11b06aa02cd60d416da1c8607310d55

  • SSDEEP

    768:Rp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:RpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_5cce134e385799449c59a9b14b30aa5c

    • Size

      34KB

    • MD5

      5cce134e385799449c59a9b14b30aa5c

    • SHA1

      096fde169c14661bc30701f290d52b857adfc426

    • SHA256

      807b96a97dfc75bfeb8a2da4ad3b0213612d2c698bd4ed42f63a911986e55add

    • SHA512

      197df59f44200d97efff26483fb2c7ee633992672f4bc51bdb6c27d46a46c483cb078d7374c23aa55f1eab1ef2d1a6e5c11b06aa02cd60d416da1c8607310d55

    • SSDEEP

      768:Rp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:RpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks