General

  • Target

    JaffaCakes118_7b9227f98eea65ad3cab1e755cc825a0

  • Size

    171KB

  • Sample

    250104-y3l2jsvrbs

  • MD5

    7b9227f98eea65ad3cab1e755cc825a0

  • SHA1

    afb49223eafa9a12edc77f490c7270d6ae290da1

  • SHA256

    0482ac285c4e941a82de2425c3572ef2b951f90423d85627a282147fb3b95d14

  • SHA512

    df0810cadccbac745a828d08b8d8b9630fd0f24f3c7fa4eabccbc019f30b2aba67b1acc4be61e4b8cdf7192d4a86a602aadefa988d2a7c3dc7430bacb04f432f

  • SSDEEP

    3072:aNa3V0rxgN+E+bjKFmEHKjbMpZszZHqiD:oal0aUELIEm6ZstKM

Malware Config

Targets

    • Target

      JaffaCakes118_7b9227f98eea65ad3cab1e755cc825a0

    • Size

      171KB

    • MD5

      7b9227f98eea65ad3cab1e755cc825a0

    • SHA1

      afb49223eafa9a12edc77f490c7270d6ae290da1

    • SHA256

      0482ac285c4e941a82de2425c3572ef2b951f90423d85627a282147fb3b95d14

    • SHA512

      df0810cadccbac745a828d08b8d8b9630fd0f24f3c7fa4eabccbc019f30b2aba67b1acc4be61e4b8cdf7192d4a86a602aadefa988d2a7c3dc7430bacb04f432f

    • SSDEEP

      3072:aNa3V0rxgN+E+bjKFmEHKjbMpZszZHqiD:oal0aUELIEm6ZstKM

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks