General

  • Target

    JaffaCakes118_5f8986ef8db004964a7e7f64ed3e0d7f

  • Size

    34KB

  • Sample

    250101-wvzlkawrhy

  • MD5

    5f8986ef8db004964a7e7f64ed3e0d7f

  • SHA1

    fc65db556ba81fc38b2508dfa457f631868743cf

  • SHA256

    a20f57fa9cd5d5322cb3b718fcbb857ae9af25f63a376524cc7bce975bbe96ee

  • SHA512

    ebce587f08089d23164b15937acf9baf44f7eb352e35eb446564b05f725b32f368081ed1694fe623fac67606476a3011c6472ea13ef40aa9cd999b771ba34742

  • SSDEEP

    768:Pp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:PpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_5f8986ef8db004964a7e7f64ed3e0d7f

    • Size

      34KB

    • MD5

      5f8986ef8db004964a7e7f64ed3e0d7f

    • SHA1

      fc65db556ba81fc38b2508dfa457f631868743cf

    • SHA256

      a20f57fa9cd5d5322cb3b718fcbb857ae9af25f63a376524cc7bce975bbe96ee

    • SHA512

      ebce587f08089d23164b15937acf9baf44f7eb352e35eb446564b05f725b32f368081ed1694fe623fac67606476a3011c6472ea13ef40aa9cd999b771ba34742

    • SSDEEP

      768:Pp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:PpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks