General

  • Target

    JaffaCakes118_236c7e38311f6117162d7acdb7c4e4dd

  • Size

    89KB

  • Sample

    250106-plc8msymcm

  • MD5

    236c7e38311f6117162d7acdb7c4e4dd

  • SHA1

    91c4edac6b3f4b0bab154cf36ce2ddcf62ca45c5

  • SHA256

    534c68990a0e1a6f2832b2be92062b01b0f225c7523619307e1cb31981471eb0

  • SHA512

    c7df316098b31a170843467fc4cc6ed1c3a0dfdb4fe52d3a56243e9cadb51aae4d5a386a7182520cc439cb31e277990f1d8be6aa878a78cfb0c0a167ca4f1c1a

  • SSDEEP

    1536:Nr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:h+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_236c7e38311f6117162d7acdb7c4e4dd

    • Size

      89KB

    • MD5

      236c7e38311f6117162d7acdb7c4e4dd

    • SHA1

      91c4edac6b3f4b0bab154cf36ce2ddcf62ca45c5

    • SHA256

      534c68990a0e1a6f2832b2be92062b01b0f225c7523619307e1cb31981471eb0

    • SHA512

      c7df316098b31a170843467fc4cc6ed1c3a0dfdb4fe52d3a56243e9cadb51aae4d5a386a7182520cc439cb31e277990f1d8be6aa878a78cfb0c0a167ca4f1c1a

    • SSDEEP

      1536:Nr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:h+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks