General

  • Target

    JaffaCakes118_842db3aaa2654ac0b83731079db6c8b7

  • Size

    89KB

  • Sample

    250108-b3crjsykbz

  • MD5

    842db3aaa2654ac0b83731079db6c8b7

  • SHA1

    c9b41dbb7644339796e39d931f66417044ff0a3e

  • SHA256

    ed69a950d5ba4e2c0338aa5bfe8e5d6ecabb9efcfdc9953f5c8498c7078a18c7

  • SHA512

    8a4c39e790f5b3ff54acb7105f94acca87052e325de11a87f83a41975dee926969a6ad7b2c9c578b14c1546803fffc60a5d4563f064389b32d144a1b58981db5

  • SSDEEP

    1536:Dr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:X+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_842db3aaa2654ac0b83731079db6c8b7

    • Size

      89KB

    • MD5

      842db3aaa2654ac0b83731079db6c8b7

    • SHA1

      c9b41dbb7644339796e39d931f66417044ff0a3e

    • SHA256

      ed69a950d5ba4e2c0338aa5bfe8e5d6ecabb9efcfdc9953f5c8498c7078a18c7

    • SHA512

      8a4c39e790f5b3ff54acb7105f94acca87052e325de11a87f83a41975dee926969a6ad7b2c9c578b14c1546803fffc60a5d4563f064389b32d144a1b58981db5

    • SSDEEP

      1536:Dr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:X+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks