General

  • Target

    JaffaCakes118_74ed2f0bbebd5a8fcba7538b754da0da

  • Size

    36KB

  • Sample

    250107-x3rflavmc1

  • MD5

    74ed2f0bbebd5a8fcba7538b754da0da

  • SHA1

    e522ca3c6f63249a01bf9876b6050f3d5800eff3

  • SHA256

    0c81de86734b9572a69818e7a3ebb50cacc4c460d676b5cf0f42b2647cfc7959

  • SHA512

    0088f9199c65ca2012347552c13cc65d6209eedbb631e8c1bd286301966384690409cd6f29d067d466caaa111867fc15e4bf2148b29e3417103e89df1f1df271

  • SSDEEP

    768:np22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J:npYoX58z1uirL98xMWnT0OQ9J

Malware Config

Targets

    • Target

      JaffaCakes118_74ed2f0bbebd5a8fcba7538b754da0da

    • Size

      36KB

    • MD5

      74ed2f0bbebd5a8fcba7538b754da0da

    • SHA1

      e522ca3c6f63249a01bf9876b6050f3d5800eff3

    • SHA256

      0c81de86734b9572a69818e7a3ebb50cacc4c460d676b5cf0f42b2647cfc7959

    • SHA512

      0088f9199c65ca2012347552c13cc65d6209eedbb631e8c1bd286301966384690409cd6f29d067d466caaa111867fc15e4bf2148b29e3417103e89df1f1df271

    • SSDEEP

      768:np22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J:npYoX58z1uirL98xMWnT0OQ9J

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks