General

  • Target

    JaffaCakes118_502fe6054f99c7f35bdb8e46ec186a66

  • Size

    160KB

  • Sample

    250107-f66agsykck

  • MD5

    502fe6054f99c7f35bdb8e46ec186a66

  • SHA1

    bd9b3c826f3d69ffdc1c1eed7ec232992eea033f

  • SHA256

    584203204cc442c6b51a52b92f2e37c8d9c318561b706155cf5e9e54a3097173

  • SHA512

    86f458d673ecc47a0e179b6c97367b007fdb19f22705c7d41733bad3ee80fd5ba983b805dd30c1bb26764626ab49cff9d4a3ac0fe704bb985ad4405ba7786007

  • SSDEEP

    1536:vEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:cY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_502fe6054f99c7f35bdb8e46ec186a66

    • Size

      160KB

    • MD5

      502fe6054f99c7f35bdb8e46ec186a66

    • SHA1

      bd9b3c826f3d69ffdc1c1eed7ec232992eea033f

    • SHA256

      584203204cc442c6b51a52b92f2e37c8d9c318561b706155cf5e9e54a3097173

    • SHA512

      86f458d673ecc47a0e179b6c97367b007fdb19f22705c7d41733bad3ee80fd5ba983b805dd30c1bb26764626ab49cff9d4a3ac0fe704bb985ad4405ba7786007

    • SSDEEP

      1536:vEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:cY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks