General

  • Target

    JaffaCakes118_5fe5e4b145d599810449046505d5a045

  • Size

    34KB

  • Sample

    250107-ngbzca1kcj

  • MD5

    5fe5e4b145d599810449046505d5a045

  • SHA1

    f4904f4de5027b49b744ca6cf02e57337b1986a4

  • SHA256

    7995bccbc98316b364352a42a2f05ffe60c1ddbd30808d244b5f32ed7c92d189

  • SHA512

    617c55c901634e4bfc53cf10c8acc583a362173b67819f30c8f41be9d3447f56c02e68ff785c48e38deaaede8bcb7897deede9c726258e5054da5684ba72d496

  • SSDEEP

    768:4p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:4pYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_5fe5e4b145d599810449046505d5a045

    • Size

      34KB

    • MD5

      5fe5e4b145d599810449046505d5a045

    • SHA1

      f4904f4de5027b49b744ca6cf02e57337b1986a4

    • SHA256

      7995bccbc98316b364352a42a2f05ffe60c1ddbd30808d244b5f32ed7c92d189

    • SHA512

      617c55c901634e4bfc53cf10c8acc583a362173b67819f30c8f41be9d3447f56c02e68ff785c48e38deaaede8bcb7897deede9c726258e5054da5684ba72d496

    • SSDEEP

      768:4p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:4pYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks