General

  • Target

    JaffaCakes118_7d555553325a0f740a7a0d70aa6b89ba

  • Size

    160KB

  • Sample

    250107-2q6rzasley

  • MD5

    7d555553325a0f740a7a0d70aa6b89ba

  • SHA1

    06b465305b8b1b2f41e6ba6b17a6c0d50796fe9c

  • SHA256

    cc6c8bfa45eee6276303e52a5efcc8c90f15165b4aa429c030078409cb784b90

  • SHA512

    12598ee8324bc9fa862bf71d1d7f95a529bad016c4126f6294a1c1e5d187e158af0311da6e738a06f8bbf3ab5e6b3f0ed1f09b5c10eecdeae892c745fdf99758

  • SSDEEP

    1536:OEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:FY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_7d555553325a0f740a7a0d70aa6b89ba

    • Size

      160KB

    • MD5

      7d555553325a0f740a7a0d70aa6b89ba

    • SHA1

      06b465305b8b1b2f41e6ba6b17a6c0d50796fe9c

    • SHA256

      cc6c8bfa45eee6276303e52a5efcc8c90f15165b4aa429c030078409cb784b90

    • SHA512

      12598ee8324bc9fa862bf71d1d7f95a529bad016c4126f6294a1c1e5d187e158af0311da6e738a06f8bbf3ab5e6b3f0ed1f09b5c10eecdeae892c745fdf99758

    • SSDEEP

      1536:OEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:FY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks