General

  • Target

    JaffaCakes118_8ead2c95f7d0ddfa2080fc1308dd91c9

  • Size

    34KB

  • Sample

    250105-f7s2jswjel

  • MD5

    8ead2c95f7d0ddfa2080fc1308dd91c9

  • SHA1

    7ea59a470e3af6f5eaaca50a36fbb1af369a4cb1

  • SHA256

    a7395220524deefe2161e5c9fdbe8cd5a151171a180c9df0f9f9400c39438311

  • SHA512

    7c22a57541483feede9cdd8d8cb48dd2ec4d0e5d004629dbe1facc7c42b3afc6797467b3876b4e0029660f7f06bf62122ac7d72b0ab9809a9c0cf9f48556e7a7

  • SSDEEP

    768:9p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:9pYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_8ead2c95f7d0ddfa2080fc1308dd91c9

    • Size

      34KB

    • MD5

      8ead2c95f7d0ddfa2080fc1308dd91c9

    • SHA1

      7ea59a470e3af6f5eaaca50a36fbb1af369a4cb1

    • SHA256

      a7395220524deefe2161e5c9fdbe8cd5a151171a180c9df0f9f9400c39438311

    • SHA512

      7c22a57541483feede9cdd8d8cb48dd2ec4d0e5d004629dbe1facc7c42b3afc6797467b3876b4e0029660f7f06bf62122ac7d72b0ab9809a9c0cf9f48556e7a7

    • SSDEEP

      768:9p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:9pYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks