General

  • Target

    JaffaCakes118_9c28bc099daa1f1e53c219492588533c

  • Size

    34KB

  • Sample

    250105-lzqt4s1jcz

  • MD5

    9c28bc099daa1f1e53c219492588533c

  • SHA1

    441e578b34402a21f10232f7bded2ce8515d1d66

  • SHA256

    acc2b8e45dd204f23cc89ba43e3183b5d9fb4054ce3ac8e142713cd3b1565b8d

  • SHA512

    7b56f040d343d3579b857f0fabfb815bac37f7cbebd2ceaaa2e045378d2be90153511242b84c1938724c95e96e32e7d217adb6ed61e7e762dd122471385208c8

  • SSDEEP

    768:sp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:spYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_9c28bc099daa1f1e53c219492588533c

    • Size

      34KB

    • MD5

      9c28bc099daa1f1e53c219492588533c

    • SHA1

      441e578b34402a21f10232f7bded2ce8515d1d66

    • SHA256

      acc2b8e45dd204f23cc89ba43e3183b5d9fb4054ce3ac8e142713cd3b1565b8d

    • SHA512

      7b56f040d343d3579b857f0fabfb815bac37f7cbebd2ceaaa2e045378d2be90153511242b84c1938724c95e96e32e7d217adb6ed61e7e762dd122471385208c8

    • SSDEEP

      768:sp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:spYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks