General

  • Target

    JaffaCakes118_7c7b50b79af9f9d0d1d302cb59c9004a

  • Size

    34KB

  • Sample

    250104-2hb8ds1kdx

  • MD5

    7c7b50b79af9f9d0d1d302cb59c9004a

  • SHA1

    122bc84c04d1b09d7dac9e9439870d2c59f1fab6

  • SHA256

    5a971657c54220e2c979c4a86935e3fcfd2b85ea82662770c6ca30d1e959dc2b

  • SHA512

    6eab1fba02949f819c03256df6230e121972d9b513cde881b4b640c76a6803966b1ee560cef4fff681c819892e3c44020c44fe7224033e23c2594a330c10980e

  • SSDEEP

    768:Qp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:QpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_7c7b50b79af9f9d0d1d302cb59c9004a

    • Size

      34KB

    • MD5

      7c7b50b79af9f9d0d1d302cb59c9004a

    • SHA1

      122bc84c04d1b09d7dac9e9439870d2c59f1fab6

    • SHA256

      5a971657c54220e2c979c4a86935e3fcfd2b85ea82662770c6ca30d1e959dc2b

    • SHA512

      6eab1fba02949f819c03256df6230e121972d9b513cde881b4b640c76a6803966b1ee560cef4fff681c819892e3c44020c44fe7224033e23c2594a330c10980e

    • SSDEEP

      768:Qp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:QpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks