General

  • Target

    JaffaCakes118_3051d40af1c2f2dc6b661a002c52c53a

  • Size

    160KB

  • Sample

    250106-vv9absslg1

  • MD5

    3051d40af1c2f2dc6b661a002c52c53a

  • SHA1

    d2ce8a0017523774733dc500fdb567eff2afc6c7

  • SHA256

    f588aed066eb8b6df5e1b31310b84a33ab5356ed3912bbb1314697733cfbfead

  • SHA512

    ee021ab13db864ec570c0eebcb658fa8d3f164e2b18e2f5d8d8a084de95b2d09faa521a0d524690da6e6b7647225415a1362756d8bf8dbf59f41b8b04db0ee67

  • SSDEEP

    1536:SEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:ZY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_3051d40af1c2f2dc6b661a002c52c53a

    • Size

      160KB

    • MD5

      3051d40af1c2f2dc6b661a002c52c53a

    • SHA1

      d2ce8a0017523774733dc500fdb567eff2afc6c7

    • SHA256

      f588aed066eb8b6df5e1b31310b84a33ab5356ed3912bbb1314697733cfbfead

    • SHA512

      ee021ab13db864ec570c0eebcb658fa8d3f164e2b18e2f5d8d8a084de95b2d09faa521a0d524690da6e6b7647225415a1362756d8bf8dbf59f41b8b04db0ee67

    • SSDEEP

      1536:SEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:ZY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks