General

  • Target

    JaffaCakes118_0c2e7e189dfe436c66c6b01ac19d5052

  • Size

    160KB

  • Sample

    250106-d63s9avmgw

  • MD5

    0c2e7e189dfe436c66c6b01ac19d5052

  • SHA1

    a509e2c2487dc2a9441a25cfba8ccfd029d8b1a1

  • SHA256

    9bb3ac86ced1f62236de71248455d5c234bfd87d7fe8a528d02995a084fe425a

  • SHA512

    f341500250d76c6c0d2ffa1d912e7e3c37a2ba4cef5ee6e209391449b6bb463e80203e75d4b83620adff7525eef7604d8d35741232ace120d573e27e3f376875

  • SSDEEP

    1536:eEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:VY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_0c2e7e189dfe436c66c6b01ac19d5052

    • Size

      160KB

    • MD5

      0c2e7e189dfe436c66c6b01ac19d5052

    • SHA1

      a509e2c2487dc2a9441a25cfba8ccfd029d8b1a1

    • SHA256

      9bb3ac86ced1f62236de71248455d5c234bfd87d7fe8a528d02995a084fe425a

    • SHA512

      f341500250d76c6c0d2ffa1d912e7e3c37a2ba4cef5ee6e209391449b6bb463e80203e75d4b83620adff7525eef7604d8d35741232ace120d573e27e3f376875

    • SSDEEP

      1536:eEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:VY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks