General

  • Target

    JaffaCakes118_8f272a82acb1fe1cc547979acd23f6ca

  • Size

    160KB

  • Sample

    250108-gmcz9sxje1

  • MD5

    8f272a82acb1fe1cc547979acd23f6ca

  • SHA1

    9ab117c6a80becf41d98375f27829c2e47a430a8

  • SHA256

    254c8b403596068b91a5515ea16eadf1a55636a7c4e52a937b2241e2018a5117

  • SHA512

    5d3ae686ec7cb7e2e89da194aacb2c2e1361d087e1e83b1fdc4cfe96a2dfe277c2a039c865c5a83b1a3230609336754e69b0892a28c399c780c4d53abf89a67b

  • SSDEEP

    1536:/EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:sY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_8f272a82acb1fe1cc547979acd23f6ca

    • Size

      160KB

    • MD5

      8f272a82acb1fe1cc547979acd23f6ca

    • SHA1

      9ab117c6a80becf41d98375f27829c2e47a430a8

    • SHA256

      254c8b403596068b91a5515ea16eadf1a55636a7c4e52a937b2241e2018a5117

    • SHA512

      5d3ae686ec7cb7e2e89da194aacb2c2e1361d087e1e83b1fdc4cfe96a2dfe277c2a039c865c5a83b1a3230609336754e69b0892a28c399c780c4d53abf89a67b

    • SSDEEP

      1536:/EY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:sY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks