General

  • Target

    JaffaCakes118_369f5611f6fb13cc2ae38611db75c758

  • Size

    58KB

  • Sample

    250106-ybkpeaxndr

  • MD5

    369f5611f6fb13cc2ae38611db75c758

  • SHA1

    f408de3b5090acc339cc9cf45b9cb4b238c05098

  • SHA256

    18fc38daf13abe5b65c9cb694bd551a1b1d11b9077b0f255a680f567c0c949aa

  • SHA512

    f6dfdfa7003f2dd7633670e7dd4231ed740ab4d2b4c34c3ec1f88d40c5de254026b8796b51f29d30bd897a7fc6283e3222374512be706557d4c35d7399bf1ee5

  • SSDEEP

    768:RM5WaKyBevI8OHKA+hmXid6Z9HUEMyerTAzwavKCFC/nGVykmBdwxkpNZsP:S5P2vIg7dNrTAzZv3FaGU5LRm

Malware Config

Targets

    • Target

      JaffaCakes118_369f5611f6fb13cc2ae38611db75c758

    • Size

      58KB

    • MD5

      369f5611f6fb13cc2ae38611db75c758

    • SHA1

      f408de3b5090acc339cc9cf45b9cb4b238c05098

    • SHA256

      18fc38daf13abe5b65c9cb694bd551a1b1d11b9077b0f255a680f567c0c949aa

    • SHA512

      f6dfdfa7003f2dd7633670e7dd4231ed740ab4d2b4c34c3ec1f88d40c5de254026b8796b51f29d30bd897a7fc6283e3222374512be706557d4c35d7399bf1ee5

    • SSDEEP

      768:RM5WaKyBevI8OHKA+hmXid6Z9HUEMyerTAzwavKCFC/nGVykmBdwxkpNZsP:S5P2vIg7dNrTAzZv3FaGU5LRm

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks