General

  • Target

    JaffaCakes118_865cb072075828bffe5801b283daa796

  • Size

    160KB

  • Sample

    250108-c1f7mazpg1

  • MD5

    865cb072075828bffe5801b283daa796

  • SHA1

    ad856c3b34c7e71959eaa74252a26ffe044293d0

  • SHA256

    e97c30eef28ce966a1477b5a7d22d0fcfecbf89ceb684ef983ede91faf2b4dfd

  • SHA512

    f5224df0dfae4738ed23e692b0b9e0e20833ed9430ca978e2a1bec6b680924501dbddb2f74c9fbd797465ec38a30c1ee0c5293f0952f1ce806d4728d4cd550b1

  • SSDEEP

    1536:sEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:PY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_865cb072075828bffe5801b283daa796

    • Size

      160KB

    • MD5

      865cb072075828bffe5801b283daa796

    • SHA1

      ad856c3b34c7e71959eaa74252a26ffe044293d0

    • SHA256

      e97c30eef28ce966a1477b5a7d22d0fcfecbf89ceb684ef983ede91faf2b4dfd

    • SHA512

      f5224df0dfae4738ed23e692b0b9e0e20833ed9430ca978e2a1bec6b680924501dbddb2f74c9fbd797465ec38a30c1ee0c5293f0952f1ce806d4728d4cd550b1

    • SSDEEP

      1536:sEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:PY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks