General

  • Target

    JaffaCakes118_3cc5ac9fa6f50addebaec8bde2ac3cfc

  • Size

    160KB

  • Sample

    250106-1vmzzs1qcp

  • MD5

    3cc5ac9fa6f50addebaec8bde2ac3cfc

  • SHA1

    c6ec8feb3908a827ac0ff88abe22432ced2c6b3b

  • SHA256

    b2d80dc3de9313e828bdaab1ef8d976d8b72cfac6c56f237be1d9252c2b94636

  • SHA512

    78df9ca19a171cafa8a5d789ef267084058f6f523204289a37d5bc43393c9b251f9d27240e392df2f49b5322968dbabafa9e181c682665c1e91673349af951f6

  • SSDEEP

    1536:CEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:JY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_3cc5ac9fa6f50addebaec8bde2ac3cfc

    • Size

      160KB

    • MD5

      3cc5ac9fa6f50addebaec8bde2ac3cfc

    • SHA1

      c6ec8feb3908a827ac0ff88abe22432ced2c6b3b

    • SHA256

      b2d80dc3de9313e828bdaab1ef8d976d8b72cfac6c56f237be1d9252c2b94636

    • SHA512

      78df9ca19a171cafa8a5d789ef267084058f6f523204289a37d5bc43393c9b251f9d27240e392df2f49b5322968dbabafa9e181c682665c1e91673349af951f6

    • SSDEEP

      1536:CEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:JY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks