General

  • Target

    JaffaCakes118_a6f49268044adfb73e4f8ea088c3dcfa

  • Size

    160KB

  • Sample

    250105-qly1saxmej

  • MD5

    a6f49268044adfb73e4f8ea088c3dcfa

  • SHA1

    5b92442c8945f9edf38e8126fc89020f53246004

  • SHA256

    5df09e43f7d1ec24ee6bfb27102dfbaf466c620613338d1a28c0cff86b128e3e

  • SHA512

    57f0dea14fae90415722ec137c910148a2aeef0f6f101f8da6542ca61ca00edf8369b0020fc64bcc11c7cac37a5021bc7bb7af55f9605c9fea5622f1403d5a68

  • SSDEEP

    1536:CEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:JY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_a6f49268044adfb73e4f8ea088c3dcfa

    • Size

      160KB

    • MD5

      a6f49268044adfb73e4f8ea088c3dcfa

    • SHA1

      5b92442c8945f9edf38e8126fc89020f53246004

    • SHA256

      5df09e43f7d1ec24ee6bfb27102dfbaf466c620613338d1a28c0cff86b128e3e

    • SHA512

      57f0dea14fae90415722ec137c910148a2aeef0f6f101f8da6542ca61ca00edf8369b0020fc64bcc11c7cac37a5021bc7bb7af55f9605c9fea5622f1403d5a68

    • SSDEEP

      1536:CEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:JY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks