General

  • Target

    JaffaCakes118_b9de1a7e33838739765280f88cd4d085

  • Size

    46KB

  • Sample

    250105-ycb4natndv

  • MD5

    b9de1a7e33838739765280f88cd4d085

  • SHA1

    b33cae4f136d285e586be2e06f08fcedb503ead4

  • SHA256

    f87c76ce50c25cbd35a4ba2309ac20508300b2aa7e8432b1f6c5ed414409c45b

  • SHA512

    21ff6386d6e4258b29e84d4fd7d817a7573fcf100268aa8f0dac82059c79ca52093e5cacb68cb0201632a45e3632022b212b52ecd332fad140273a6555c0808c

  • SSDEEP

    768:HtwyMe0Jy8xwd117mrlI9m/xGuv4V7RMEnqt9jn2ACH3hLZ2HwCLlH:Htwyedxwr1qUMv4VV6j2A83hVY

Malware Config

Targets

    • Target

      JaffaCakes118_b9de1a7e33838739765280f88cd4d085

    • Size

      46KB

    • MD5

      b9de1a7e33838739765280f88cd4d085

    • SHA1

      b33cae4f136d285e586be2e06f08fcedb503ead4

    • SHA256

      f87c76ce50c25cbd35a4ba2309ac20508300b2aa7e8432b1f6c5ed414409c45b

    • SHA512

      21ff6386d6e4258b29e84d4fd7d817a7573fcf100268aa8f0dac82059c79ca52093e5cacb68cb0201632a45e3632022b212b52ecd332fad140273a6555c0808c

    • SSDEEP

      768:HtwyMe0Jy8xwd117mrlI9m/xGuv4V7RMEnqt9jn2ACH3hLZ2HwCLlH:Htwyedxwr1qUMv4VV6j2A83hVY

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks