General

  • Target

    JaffaCakes118_5f82425ada0b04a677e9e7c5383c7e08

  • Size

    89KB

  • Sample

    250107-natktazrel

  • MD5

    5f82425ada0b04a677e9e7c5383c7e08

  • SHA1

    3164d005f31b21ace9a7ea42c8339a66fb1ae5e8

  • SHA256

    d8a4001ef8a89a191ec206514b048c02a7474d5c176b3a94ef2dc544726dd0c9

  • SHA512

    e658084e575d0da946a0558e107e7745eac82d6b04849c3e6955c8cce290572869e30c181536b6aea46c9c2b24ed30444a6afd880cc9ca3c6a5f78ec28f2568d

  • SSDEEP

    1536:4r+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:q+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_5f82425ada0b04a677e9e7c5383c7e08

    • Size

      89KB

    • MD5

      5f82425ada0b04a677e9e7c5383c7e08

    • SHA1

      3164d005f31b21ace9a7ea42c8339a66fb1ae5e8

    • SHA256

      d8a4001ef8a89a191ec206514b048c02a7474d5c176b3a94ef2dc544726dd0c9

    • SHA512

      e658084e575d0da946a0558e107e7745eac82d6b04849c3e6955c8cce290572869e30c181536b6aea46c9c2b24ed30444a6afd880cc9ca3c6a5f78ec28f2568d

    • SSDEEP

      1536:4r+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:q+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks