General

  • Target

    JaffaCakes118_7e769d2a9a17dbb2a1909e64d1e9b028

  • Size

    160KB

  • Sample

    250107-28tkcsvpem

  • MD5

    7e769d2a9a17dbb2a1909e64d1e9b028

  • SHA1

    9a26e1c67ca0015ff3ebd043305b8e2f335b2e12

  • SHA256

    f898d36e30c5a0cc871968fffc7cc99f3e7f650c6248ce866353dd318c0908da

  • SHA512

    6d18dd16ea37f922ddb154fd43797a01238d47ba6480960525d0d163176c634aaf98b0c65ab084f2d3db9850902f664b5b6f1a8948ee4082a2d1871a30dcef12

  • SSDEEP

    1536:4EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:7Y+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_7e769d2a9a17dbb2a1909e64d1e9b028

    • Size

      160KB

    • MD5

      7e769d2a9a17dbb2a1909e64d1e9b028

    • SHA1

      9a26e1c67ca0015ff3ebd043305b8e2f335b2e12

    • SHA256

      f898d36e30c5a0cc871968fffc7cc99f3e7f650c6248ce866353dd318c0908da

    • SHA512

      6d18dd16ea37f922ddb154fd43797a01238d47ba6480960525d0d163176c634aaf98b0c65ab084f2d3db9850902f664b5b6f1a8948ee4082a2d1871a30dcef12

    • SSDEEP

      1536:4EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:7Y+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks