General

  • Target

    JaffaCakes118_6894d3613722f9190563365dce8e9217

  • Size

    89KB

  • Sample

    250102-2bsa2a1mdr

  • MD5

    6894d3613722f9190563365dce8e9217

  • SHA1

    5dc821f88856b48048726fdacc06787d9f600ae0

  • SHA256

    24101fcae7a5adcb398d49c56555361d62d093cbdc53e4d07472ec15580cf7b3

  • SHA512

    96d7effd1aa34dc257e9117b4171e3b607baf64946b898b985a4c5e31ee7f9ac4b80a93224ec2646cf1c1b6e2cdcf65564e686dfd034ff1e3a8e57afc7c4cfb8

  • SSDEEP

    1536:1r+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:J+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_6894d3613722f9190563365dce8e9217

    • Size

      89KB

    • MD5

      6894d3613722f9190563365dce8e9217

    • SHA1

      5dc821f88856b48048726fdacc06787d9f600ae0

    • SHA256

      24101fcae7a5adcb398d49c56555361d62d093cbdc53e4d07472ec15580cf7b3

    • SHA512

      96d7effd1aa34dc257e9117b4171e3b607baf64946b898b985a4c5e31ee7f9ac4b80a93224ec2646cf1c1b6e2cdcf65564e686dfd034ff1e3a8e57afc7c4cfb8

    • SSDEEP

      1536:1r+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:J+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks