General

  • Target

    JaffaCakes118_78dd9c61cfb80276801ba9874b9badbd

  • Size

    34KB

  • Sample

    250104-k7j6vsvndl

  • MD5

    78dd9c61cfb80276801ba9874b9badbd

  • SHA1

    805724f67ae49d4949d751aeabf0f867069bb194

  • SHA256

    dff7a4739d71ce9f176e8524d9daa6caef262f767c6feed92902526ff8cdd8d9

  • SHA512

    09293151606d66516b23f85cf605c5d38995b091f924f6aefc0bb88dcec0ed01e8e8c08621d5c12fe9f2a4211f01d8483a8136045e7feb1d19afa38d7db3c8d4

  • SSDEEP

    768:Yp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:YpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_78dd9c61cfb80276801ba9874b9badbd

    • Size

      34KB

    • MD5

      78dd9c61cfb80276801ba9874b9badbd

    • SHA1

      805724f67ae49d4949d751aeabf0f867069bb194

    • SHA256

      dff7a4739d71ce9f176e8524d9daa6caef262f767c6feed92902526ff8cdd8d9

    • SHA512

      09293151606d66516b23f85cf605c5d38995b091f924f6aefc0bb88dcec0ed01e8e8c08621d5c12fe9f2a4211f01d8483a8136045e7feb1d19afa38d7db3c8d4

    • SSDEEP

      768:Yp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:YpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks