General

  • Target

    JaffaCakes118_766ea3172f02753f4a4f747564371518

  • Size

    34KB

  • Sample

    250107-yp968awmet

  • MD5

    766ea3172f02753f4a4f747564371518

  • SHA1

    b43ef8c082b572a513c93f6b2f3e750bbfab2e63

  • SHA256

    f48ae420b29483321a91ff10f0cab6ea8cca16d186638466481ec148c872cf36

  • SHA512

    434328419411e3ef114a6ec0dd8ecde0e620221d894d2fb96162f73ff20afe3ef6179970e429c147abe9b71e22d3252b939425f1c89f55b72ff60a89a423413b

  • SSDEEP

    768:Bp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:BpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_766ea3172f02753f4a4f747564371518

    • Size

      34KB

    • MD5

      766ea3172f02753f4a4f747564371518

    • SHA1

      b43ef8c082b572a513c93f6b2f3e750bbfab2e63

    • SHA256

      f48ae420b29483321a91ff10f0cab6ea8cca16d186638466481ec148c872cf36

    • SHA512

      434328419411e3ef114a6ec0dd8ecde0e620221d894d2fb96162f73ff20afe3ef6179970e429c147abe9b71e22d3252b939425f1c89f55b72ff60a89a423413b

    • SSDEEP

      768:Bp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:BpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks