General

  • Target

    JaffaCakes118_76d2664f829f6556992ec0b36ffc9f7e

  • Size

    58KB

  • Sample

    250107-ywcvasykhm

  • MD5

    76d2664f829f6556992ec0b36ffc9f7e

  • SHA1

    064a0ed2b6d165b7656e8f6f9f9e2941c132bfdd

  • SHA256

    0d29ef961863f8b742106f39d92fd0f48a7a285376bff4bb74a85db39a8fa837

  • SHA512

    54bce07ae203ac6f90cc1ffdea5e76a5acc3a813c9e3160ab65aaf3e88e0b7799ae39d46be9a317c623dec2ea4b0e9b0a35ff69982a7ed052718f29a2db35061

  • SSDEEP

    768:lM5WaKyBevI8OHKA+hmXid6Z9HUEMyerTAzwavKCFC/nGVykmBdwxkpNZsP:m5P2vIg7dNrTAzZv3FaGU5LRm

Malware Config

Targets

    • Target

      JaffaCakes118_76d2664f829f6556992ec0b36ffc9f7e

    • Size

      58KB

    • MD5

      76d2664f829f6556992ec0b36ffc9f7e

    • SHA1

      064a0ed2b6d165b7656e8f6f9f9e2941c132bfdd

    • SHA256

      0d29ef961863f8b742106f39d92fd0f48a7a285376bff4bb74a85db39a8fa837

    • SHA512

      54bce07ae203ac6f90cc1ffdea5e76a5acc3a813c9e3160ab65aaf3e88e0b7799ae39d46be9a317c623dec2ea4b0e9b0a35ff69982a7ed052718f29a2db35061

    • SSDEEP

      768:lM5WaKyBevI8OHKA+hmXid6Z9HUEMyerTAzwavKCFC/nGVykmBdwxkpNZsP:m5P2vIg7dNrTAzZv3FaGU5LRm

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks