General

  • Target

    JaffaCakes118_6e644c34142ada97cf719a9f52b2d6a2

  • Size

    89KB

  • Sample

    250107-vcvdfs1pbr

  • MD5

    6e644c34142ada97cf719a9f52b2d6a2

  • SHA1

    776832f5abca304f10a187a5cf825333da057596

  • SHA256

    9f8bcf09f561b8ab5149e64e7c5b7860759aa5ba776b4e4d5b34eceee285fdb7

  • SHA512

    a67b2d25a7f7e2c5f7947892eb19b7f6a0564d2352c601a22a30362ad953a304d4bc494384ae44356fa2b68b0d25aa470017b79c26d624ee3b6241fd43593545

  • SSDEEP

    1536:zr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:H+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_6e644c34142ada97cf719a9f52b2d6a2

    • Size

      89KB

    • MD5

      6e644c34142ada97cf719a9f52b2d6a2

    • SHA1

      776832f5abca304f10a187a5cf825333da057596

    • SHA256

      9f8bcf09f561b8ab5149e64e7c5b7860759aa5ba776b4e4d5b34eceee285fdb7

    • SHA512

      a67b2d25a7f7e2c5f7947892eb19b7f6a0564d2352c601a22a30362ad953a304d4bc494384ae44356fa2b68b0d25aa470017b79c26d624ee3b6241fd43593545

    • SSDEEP

      1536:zr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:H+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks