General

  • Target

    JaffaCakes118_84d7240ad0abeeb45fad6c23cee9dd51

  • Size

    89KB

  • Sample

    250105-cm7gnazncp

  • MD5

    84d7240ad0abeeb45fad6c23cee9dd51

  • SHA1

    d74ac44cbe0321018e1e43244c1743268cecb031

  • SHA256

    524e2e24834e0a335f3b62dce627696b826820bd4e14de80a2359b26c5e898e6

  • SHA512

    a35e330218e6409693aa041dbea6af61fd4257f9da84f6268ae9eaabc5f4ed03f2beee3848f9837ee0a8770d619d68b63a53503c23538d374dca7e6563334191

  • SSDEEP

    1536:Rr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:V+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_84d7240ad0abeeb45fad6c23cee9dd51

    • Size

      89KB

    • MD5

      84d7240ad0abeeb45fad6c23cee9dd51

    • SHA1

      d74ac44cbe0321018e1e43244c1743268cecb031

    • SHA256

      524e2e24834e0a335f3b62dce627696b826820bd4e14de80a2359b26c5e898e6

    • SHA512

      a35e330218e6409693aa041dbea6af61fd4257f9da84f6268ae9eaabc5f4ed03f2beee3848f9837ee0a8770d619d68b63a53503c23538d374dca7e6563334191

    • SSDEEP

      1536:Rr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:V+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks