General

  • Target

    JaffaCakes118_0f6c3f3ddaefa3fe96ed97b6821e75a1

  • Size

    160KB

  • Sample

    250106-fgz26sypgp

  • MD5

    0f6c3f3ddaefa3fe96ed97b6821e75a1

  • SHA1

    418e0fb09d34784ac87dd766ba4c767db5baa391

  • SHA256

    40347fa59e2abc291358eeb1f179512df576faa5037f13d35969b017cc148c33

  • SHA512

    b1072e7b2fdb604df4e13aa61c19ef2bb4c87ceb83646cc767d44c28dfd757e896b3e6f7039a2a84f5329ee25ef9dadea27eedefcb014798352c7b52ecd27a23

  • SSDEEP

    1536:fEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:MY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_0f6c3f3ddaefa3fe96ed97b6821e75a1

    • Size

      160KB

    • MD5

      0f6c3f3ddaefa3fe96ed97b6821e75a1

    • SHA1

      418e0fb09d34784ac87dd766ba4c767db5baa391

    • SHA256

      40347fa59e2abc291358eeb1f179512df576faa5037f13d35969b017cc148c33

    • SHA512

      b1072e7b2fdb604df4e13aa61c19ef2bb4c87ceb83646cc767d44c28dfd757e896b3e6f7039a2a84f5329ee25ef9dadea27eedefcb014798352c7b52ecd27a23

    • SSDEEP

      1536:fEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:MY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks