General

  • Target

    JaffaCakes118_424870471d39da69df24911c2d612b50

  • Size

    89KB

  • Sample

    250107-aflv9sxjcj

  • MD5

    424870471d39da69df24911c2d612b50

  • SHA1

    df46d4acca631f384fc169ef501a06dcecf88603

  • SHA256

    16c69bbe06805e8a64fd621aa24c8db040dee4de485a1101c55b71417120bf41

  • SHA512

    3d5cc6b914c99e5e48cc8e15c748db7b47bb1a1713399ee6615a7872dff8d10cb9c3eaacdeae1cd5b95eaf85c9b8814ab69bc5ee1db0d189f74400f7ace991e6

  • SSDEEP

    1536:Kr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:M+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_424870471d39da69df24911c2d612b50

    • Size

      89KB

    • MD5

      424870471d39da69df24911c2d612b50

    • SHA1

      df46d4acca631f384fc169ef501a06dcecf88603

    • SHA256

      16c69bbe06805e8a64fd621aa24c8db040dee4de485a1101c55b71417120bf41

    • SHA512

      3d5cc6b914c99e5e48cc8e15c748db7b47bb1a1713399ee6615a7872dff8d10cb9c3eaacdeae1cd5b95eaf85c9b8814ab69bc5ee1db0d189f74400f7ace991e6

    • SSDEEP

      1536:Kr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:M+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks