General

  • Target

    JaffaCakes118_9e4f8b008b9cde7875029850efa86ade

  • Size

    34KB

  • Sample

    250105-mqg2aa1qfy

  • MD5

    9e4f8b008b9cde7875029850efa86ade

  • SHA1

    46454d4209af403e3afed59e21cfee2ec596ba04

  • SHA256

    122487611298d9115885fccf2a40f816c5150b136e38a414ea05df53b652e191

  • SHA512

    bd5a522f509159eaba8b9beeccf39603daec79912c0fd3aa37f98c6c9b4e718bd91172f02dda8055d4855454064d7245351c50803036dc7b3aa19aac4d5c3d6b

  • SSDEEP

    768:Mp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:MpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_9e4f8b008b9cde7875029850efa86ade

    • Size

      34KB

    • MD5

      9e4f8b008b9cde7875029850efa86ade

    • SHA1

      46454d4209af403e3afed59e21cfee2ec596ba04

    • SHA256

      122487611298d9115885fccf2a40f816c5150b136e38a414ea05df53b652e191

    • SHA512

      bd5a522f509159eaba8b9beeccf39603daec79912c0fd3aa37f98c6c9b4e718bd91172f02dda8055d4855454064d7245351c50803036dc7b3aa19aac4d5c3d6b

    • SSDEEP

      768:Mp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:MpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks