General

  • Target

    JaffaCakes118_7c9ff9460e51dddb1b7af0f79eb0ec2c

  • Size

    34KB

  • Sample

    250104-2qn7xs1nfv

  • MD5

    7c9ff9460e51dddb1b7af0f79eb0ec2c

  • SHA1

    2b467b1714301e0a41fc79859affec10db6c16a7

  • SHA256

    fdbb2cd324f979146ac439cb0c5ea1305c53c549207db3e21b93f2c126f268e0

  • SHA512

    96246f3ecf3a03db301290900fed4a7aa81d1212489961b4093b79291e47418ab660f5d24f6a2db5f8ae8f2d6d27e3b440b31f4bd836445d6d416a4f4d06dc41

  • SSDEEP

    768:np22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:npYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_7c9ff9460e51dddb1b7af0f79eb0ec2c

    • Size

      34KB

    • MD5

      7c9ff9460e51dddb1b7af0f79eb0ec2c

    • SHA1

      2b467b1714301e0a41fc79859affec10db6c16a7

    • SHA256

      fdbb2cd324f979146ac439cb0c5ea1305c53c549207db3e21b93f2c126f268e0

    • SHA512

      96246f3ecf3a03db301290900fed4a7aa81d1212489961b4093b79291e47418ab660f5d24f6a2db5f8ae8f2d6d27e3b440b31f4bd836445d6d416a4f4d06dc41

    • SSDEEP

      768:np22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:npYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks