General

  • Target

    JaffaCakes118_51e591e41c7d26d27419656a42d45e07

  • Size

    34KB

  • Sample

    250107-gv7vlszlcl

  • MD5

    51e591e41c7d26d27419656a42d45e07

  • SHA1

    0a4a7ce6b60d7b92d3f89734b4df99894724b723

  • SHA256

    8c06300714b1b730f4db5dfad6e452fdf616a8e7a4fad12c65f6f75ebecde9f7

  • SHA512

    f8f256eeb007eeee228da9cfb956f3f093129d5f61ec38a89639cfd920da5c44c8ba4b0ee3ced2ef9a64343389c1ed6e86c49408c6b71a009325a81beec43b22

  • SSDEEP

    768:5p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:5pYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_51e591e41c7d26d27419656a42d45e07

    • Size

      34KB

    • MD5

      51e591e41c7d26d27419656a42d45e07

    • SHA1

      0a4a7ce6b60d7b92d3f89734b4df99894724b723

    • SHA256

      8c06300714b1b730f4db5dfad6e452fdf616a8e7a4fad12c65f6f75ebecde9f7

    • SHA512

      f8f256eeb007eeee228da9cfb956f3f093129d5f61ec38a89639cfd920da5c44c8ba4b0ee3ced2ef9a64343389c1ed6e86c49408c6b71a009325a81beec43b22

    • SSDEEP

      768:5p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:5pYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks