General

  • Target

    JaffaCakes118_9c4ba08904f202f6f2f1da55c246ff62

  • Size

    34KB

  • Sample

    250105-l151es1jfw

  • MD5

    9c4ba08904f202f6f2f1da55c246ff62

  • SHA1

    b32dfa4669d3dc0ad901b0bf54b5b642d7fd6e3d

  • SHA256

    ba3e0514b68ab3b610e59ca03f51545014a63ebbcee25f36af3468e6a565254c

  • SHA512

    6e869ff275585c8ef04cd7492a00ae113af6c826439d1fc5aa5a4e728c53eb065c54b4a45d46c1bdb4910cd21c4c7446a43c71257954cba1a3f8aa416bbc3b21

  • SSDEEP

    768:dp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:dpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_9c4ba08904f202f6f2f1da55c246ff62

    • Size

      34KB

    • MD5

      9c4ba08904f202f6f2f1da55c246ff62

    • SHA1

      b32dfa4669d3dc0ad901b0bf54b5b642d7fd6e3d

    • SHA256

      ba3e0514b68ab3b610e59ca03f51545014a63ebbcee25f36af3468e6a565254c

    • SHA512

      6e869ff275585c8ef04cd7492a00ae113af6c826439d1fc5aa5a4e728c53eb065c54b4a45d46c1bdb4910cd21c4c7446a43c71257954cba1a3f8aa416bbc3b21

    • SSDEEP

      768:dp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:dpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks