General

  • Target

    JaffaCakes118_9bd9efcbcf6f570564fb793db07309f6

  • Size

    160KB

  • Sample

    250108-m1mdrayrdp

  • MD5

    9bd9efcbcf6f570564fb793db07309f6

  • SHA1

    224e2d0931cc5911bdb90ee1bf01da6e4c8bdd78

  • SHA256

    f3f48ae16496ab3762cb8a115e60ff70f97506287b016ed3f06bd26b29cd10ce

  • SHA512

    744dabb662785f9c0bd90cdc8d585b6ba9b27a91e2157ff1a148ea933e8a69e92f669260fc6902235516a3c0ebb39fe4699423a18ef27024e333d22333a2db0d

  • SSDEEP

    1536:bEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:IY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_9bd9efcbcf6f570564fb793db07309f6

    • Size

      160KB

    • MD5

      9bd9efcbcf6f570564fb793db07309f6

    • SHA1

      224e2d0931cc5911bdb90ee1bf01da6e4c8bdd78

    • SHA256

      f3f48ae16496ab3762cb8a115e60ff70f97506287b016ed3f06bd26b29cd10ce

    • SHA512

      744dabb662785f9c0bd90cdc8d585b6ba9b27a91e2157ff1a148ea933e8a69e92f669260fc6902235516a3c0ebb39fe4699423a18ef27024e333d22333a2db0d

    • SSDEEP

      1536:bEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:IY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks