General

  • Target

    JaffaCakes118_7a5d58c62db0aeef2b0a794c409800ca

  • Size

    34KB

  • Sample

    250104-sjgd3axjhr

  • MD5

    7a5d58c62db0aeef2b0a794c409800ca

  • SHA1

    3e1a245c7814e5dafe330f765377c50bdb902095

  • SHA256

    1d4591134ce40073d5abfc5d6905ec0e32b78533a4459706b0c0da2086b05c74

  • SHA512

    9462172c86efee5cd8a1aa1b061d47d4462f6dd1fd965f04c24a6f0730396c0a74283f07a5505789cb586567cca4380d5cf3ee9d07699f6b9191d70330586bee

  • SSDEEP

    768:Ap22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:ApYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_7a5d58c62db0aeef2b0a794c409800ca

    • Size

      34KB

    • MD5

      7a5d58c62db0aeef2b0a794c409800ca

    • SHA1

      3e1a245c7814e5dafe330f765377c50bdb902095

    • SHA256

      1d4591134ce40073d5abfc5d6905ec0e32b78533a4459706b0c0da2086b05c74

    • SHA512

      9462172c86efee5cd8a1aa1b061d47d4462f6dd1fd965f04c24a6f0730396c0a74283f07a5505789cb586567cca4380d5cf3ee9d07699f6b9191d70330586bee

    • SSDEEP

      768:Ap22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:ApYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks