General

  • Target

    JaffaCakes118_ab829966f3de8f0047d39e19a522fc84

  • Size

    160KB

  • Sample

    250108-zhjalavngm

  • MD5

    ab829966f3de8f0047d39e19a522fc84

  • SHA1

    3c9a26dec6da3c05fcc2e147b3f961aca3f13e9d

  • SHA256

    46b5d52a95f9bbe078e24a47787a1fea70243e7b7767df46895040b200fd562f

  • SHA512

    ad6fc57c8b2f05c74aa5f06d888d41bb4a01a6a83eb46cd45f66066e506500b4fc5b6cf8a1d1afae4397f3d094be62bc44cc71ae4df734fdb196311673dc57ff

  • SSDEEP

    1536:HEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:kY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_ab829966f3de8f0047d39e19a522fc84

    • Size

      160KB

    • MD5

      ab829966f3de8f0047d39e19a522fc84

    • SHA1

      3c9a26dec6da3c05fcc2e147b3f961aca3f13e9d

    • SHA256

      46b5d52a95f9bbe078e24a47787a1fea70243e7b7767df46895040b200fd562f

    • SHA512

      ad6fc57c8b2f05c74aa5f06d888d41bb4a01a6a83eb46cd45f66066e506500b4fc5b6cf8a1d1afae4397f3d094be62bc44cc71ae4df734fdb196311673dc57ff

    • SSDEEP

      1536:HEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:kY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks