General

  • Target

    JaffaCakes118_2bc63426004a9ba9a2cab5f2c803dbe9

  • Size

    160KB

  • Sample

    250106-s1z8hazpet

  • MD5

    2bc63426004a9ba9a2cab5f2c803dbe9

  • SHA1

    de82a0b4e373c2d2ec63871a441ed6164ea3a507

  • SHA256

    37232dccdad7eff99e1ae4f1507a5bd42c7c5ecb37cde37d8621887cee9f1119

  • SHA512

    16163127b6e92c3919abc136e1bb2807e8b1c75a9a1a33fe9d6a9559e4193dc76a2deff9b2c6658995e540e1ad28940c21cb39c568e5afcb6e2cddedb962be37

  • SSDEEP

    1536:OEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:FY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_2bc63426004a9ba9a2cab5f2c803dbe9

    • Size

      160KB

    • MD5

      2bc63426004a9ba9a2cab5f2c803dbe9

    • SHA1

      de82a0b4e373c2d2ec63871a441ed6164ea3a507

    • SHA256

      37232dccdad7eff99e1ae4f1507a5bd42c7c5ecb37cde37d8621887cee9f1119

    • SHA512

      16163127b6e92c3919abc136e1bb2807e8b1c75a9a1a33fe9d6a9559e4193dc76a2deff9b2c6658995e540e1ad28940c21cb39c568e5afcb6e2cddedb962be37

    • SSDEEP

      1536:OEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:FY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks