General

  • Target

    JaffaCakes118_8de997ffe6cf67c888a324c8d7b160a0

  • Size

    89KB

  • Sample

    250105-fzg93svpgm

  • MD5

    8de997ffe6cf67c888a324c8d7b160a0

  • SHA1

    e69a08371234330518a865c225f99c6a6c1bf391

  • SHA256

    4c5d42035c6e7c5830564abd41daf52640393333c210d111b2039a1db80d696a

  • SHA512

    bd4990350e00a9d7f21f2a46fa55e0a0b8ab07e20634e99dbd36c63becb23b10d1ce7676a0f45e75f26811ab765cd4f051d292309da3c4cf14331b64c92d843d

  • SSDEEP

    1536:Cr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:k+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_8de997ffe6cf67c888a324c8d7b160a0

    • Size

      89KB

    • MD5

      8de997ffe6cf67c888a324c8d7b160a0

    • SHA1

      e69a08371234330518a865c225f99c6a6c1bf391

    • SHA256

      4c5d42035c6e7c5830564abd41daf52640393333c210d111b2039a1db80d696a

    • SHA512

      bd4990350e00a9d7f21f2a46fa55e0a0b8ab07e20634e99dbd36c63becb23b10d1ce7676a0f45e75f26811ab765cd4f051d292309da3c4cf14331b64c92d843d

    • SSDEEP

      1536:Cr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:k+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks