General

  • Target

    JaffaCakes118_8a0e1db4ac2c0a519dce86a7ab27fca5

  • Size

    89KB

  • Sample

    250105-ekaq1stjen

  • MD5

    8a0e1db4ac2c0a519dce86a7ab27fca5

  • SHA1

    c8f4c0e855b2a4926deb0b5f3306039e7b1d4148

  • SHA256

    b5ac78837b825c7555b4e63cc52dc3dfb33c342d9141413f413f203b34dc7df8

  • SHA512

    f702d49355fac07502b9e29478917705aa374413b53998bd286a2622a3c7ff2942a959bf1479bb7ec0bf82561d2e99e7ac1512b84f9d616a66975c2bd4af2e33

  • SSDEEP

    1536:pr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:t+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_8a0e1db4ac2c0a519dce86a7ab27fca5

    • Size

      89KB

    • MD5

      8a0e1db4ac2c0a519dce86a7ab27fca5

    • SHA1

      c8f4c0e855b2a4926deb0b5f3306039e7b1d4148

    • SHA256

      b5ac78837b825c7555b4e63cc52dc3dfb33c342d9141413f413f203b34dc7df8

    • SHA512

      f702d49355fac07502b9e29478917705aa374413b53998bd286a2622a3c7ff2942a959bf1479bb7ec0bf82561d2e99e7ac1512b84f9d616a66975c2bd4af2e33

    • SSDEEP

      1536:pr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:t+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks