General

  • Target

    JaffaCakes118_715ed023967bd6335dab9e676e2e23d7

  • Size

    34KB

  • Sample

    250103-19ks6swpay

  • MD5

    715ed023967bd6335dab9e676e2e23d7

  • SHA1

    b36933c98b9ab855acf2c6251b979b3b7f01a518

  • SHA256

    ea8ee68cf4d19e1a8e6760280a5cc78b8291e71378f0baff6a48b29f68114e20

  • SHA512

    5376dcdd35d188415e5358850e3015f9203ab69c0f7945734774f2e358d2b81586b6c3055c05ba60b9b8fdadbedd009c19ef70a625df0fd6045cb7881e78f8de

  • SSDEEP

    768:hp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:hpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_715ed023967bd6335dab9e676e2e23d7

    • Size

      34KB

    • MD5

      715ed023967bd6335dab9e676e2e23d7

    • SHA1

      b36933c98b9ab855acf2c6251b979b3b7f01a518

    • SHA256

      ea8ee68cf4d19e1a8e6760280a5cc78b8291e71378f0baff6a48b29f68114e20

    • SHA512

      5376dcdd35d188415e5358850e3015f9203ab69c0f7945734774f2e358d2b81586b6c3055c05ba60b9b8fdadbedd009c19ef70a625df0fd6045cb7881e78f8de

    • SSDEEP

      768:hp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:hpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks