General

  • Target

    JaffaCakes118_93db10161c3607edf4c0e50ecd8a90c4

  • Size

    89KB

  • Sample

    250108-jmfr9szrey

  • MD5

    93db10161c3607edf4c0e50ecd8a90c4

  • SHA1

    d318790760c752b3ebc632883a12bbcf642f6aa5

  • SHA256

    03c06abc702d4c9e989abf2115b7ab2e62b844644e71111055abae4f9ff5d775

  • SHA512

    4c4be32d5cf6c5319e4037722a121667c8792828b382b76b2fdd4425646597bb779f0dc47580066957c1864d2ec281b9bd7557ef2ad56f1fcb6852d92ce4234d

  • SSDEEP

    1536:mr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:o+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_93db10161c3607edf4c0e50ecd8a90c4

    • Size

      89KB

    • MD5

      93db10161c3607edf4c0e50ecd8a90c4

    • SHA1

      d318790760c752b3ebc632883a12bbcf642f6aa5

    • SHA256

      03c06abc702d4c9e989abf2115b7ab2e62b844644e71111055abae4f9ff5d775

    • SHA512

      4c4be32d5cf6c5319e4037722a121667c8792828b382b76b2fdd4425646597bb779f0dc47580066957c1864d2ec281b9bd7557ef2ad56f1fcb6852d92ce4234d

    • SSDEEP

      1536:mr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:o+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks