General

  • Target

    JaffaCakes118_39a55bbb61510135316ee2ff83c6a792

  • Size

    160KB

  • Sample

    250106-zj4b6axkh1

  • MD5

    39a55bbb61510135316ee2ff83c6a792

  • SHA1

    54f3aef6d2b2d354bd89a2b96e375f980482fab2

  • SHA256

    70b374656caab67d1c2c70c3ce777a546a932a7d903d75aa4598b3eb9e0a34d0

  • SHA512

    66e52d4a40132f96c0bc06ab49023d7632fd81ff02ca4e614f39b653f3509083c2f373eea43b68c4d1b2930780cd5ff8c5d926b4e7648b2adecf893eb3e62698

  • SSDEEP

    1536:5EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:yY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_39a55bbb61510135316ee2ff83c6a792

    • Size

      160KB

    • MD5

      39a55bbb61510135316ee2ff83c6a792

    • SHA1

      54f3aef6d2b2d354bd89a2b96e375f980482fab2

    • SHA256

      70b374656caab67d1c2c70c3ce777a546a932a7d903d75aa4598b3eb9e0a34d0

    • SHA512

      66e52d4a40132f96c0bc06ab49023d7632fd81ff02ca4e614f39b653f3509083c2f373eea43b68c4d1b2930780cd5ff8c5d926b4e7648b2adecf893eb3e62698

    • SSDEEP

      1536:5EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:yY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks