General

  • Target

    JaffaCakes118_6efd43be666f05f015be314ccd641eec

  • Size

    34KB

  • Sample

    250103-x6kgfsslbq

  • MD5

    6efd43be666f05f015be314ccd641eec

  • SHA1

    67185dc03bceeb3d9ad751496efb9afee239f415

  • SHA256

    09df636c3723f22896fa4fb31818ff513e8d997b0f21109a8259ee5d683bf805

  • SHA512

    50476af1024c4f1d4f251b62ed20dda53f481dd0cdd819335616bb6a503143592f9379cae26a28e15225b8fe979c8643f6e10467bb942e4a61b1fa02c0cc882e

  • SSDEEP

    768:Mp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:MpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_6efd43be666f05f015be314ccd641eec

    • Size

      34KB

    • MD5

      6efd43be666f05f015be314ccd641eec

    • SHA1

      67185dc03bceeb3d9ad751496efb9afee239f415

    • SHA256

      09df636c3723f22896fa4fb31818ff513e8d997b0f21109a8259ee5d683bf805

    • SHA512

      50476af1024c4f1d4f251b62ed20dda53f481dd0cdd819335616bb6a503143592f9379cae26a28e15225b8fe979c8643f6e10467bb942e4a61b1fa02c0cc882e

    • SSDEEP

      768:Mp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:MpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks