General

  • Target

    JaffaCakes118_676935c798cb66d06294624463ebca7a

  • Size

    89KB

  • Sample

    250107-rgjkzatrgt

  • MD5

    676935c798cb66d06294624463ebca7a

  • SHA1

    3163f10c3f35507397b63f5c3bd8b2ab7afdcdf3

  • SHA256

    7d86aea86c544cf327782dc2fbc4c4534ae740b5c7f5fc7b013b89c9c58cf707

  • SHA512

    4ad69223fab4b1e2391170f1fb1829b27f773845428b0a25c8e3267b17779c0b2687eba302ac2da4f4aac216144a99a747f0dbcbf0485ba7548d178daceabfc3

  • SSDEEP

    1536:hr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7+:l+4MJIkLZJNAQ9Jo9+

Malware Config

Targets

    • Target

      JaffaCakes118_676935c798cb66d06294624463ebca7a

    • Size

      89KB

    • MD5

      676935c798cb66d06294624463ebca7a

    • SHA1

      3163f10c3f35507397b63f5c3bd8b2ab7afdcdf3

    • SHA256

      7d86aea86c544cf327782dc2fbc4c4534ae740b5c7f5fc7b013b89c9c58cf707

    • SHA512

      4ad69223fab4b1e2391170f1fb1829b27f773845428b0a25c8e3267b17779c0b2687eba302ac2da4f4aac216144a99a747f0dbcbf0485ba7548d178daceabfc3

    • SSDEEP

      1536:hr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7+:l+4MJIkLZJNAQ9Jo9+

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks