General

  • Target

    JaffaCakes118_d2e30871dcb62e750fa748326a9d683d

  • Size

    160KB

  • Sample

    250109-1fn9hatpfk

  • MD5

    d2e30871dcb62e750fa748326a9d683d

  • SHA1

    35c475a9efc4bdab2de7429d50d6a50d1af1a882

  • SHA256

    c79cee09172553b1c7f76598d29ee0f42610d680974ec1d1d034d8061e323a1f

  • SHA512

    ec59795ece454a269612d5256a21c860300e0fb707427f8a262eef4599503a0802cd71b9f384e995423e55538c8070a43cb26aade78c726e099af0053c84c2f5

  • SSDEEP

    1536:eEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:VY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_d2e30871dcb62e750fa748326a9d683d

    • Size

      160KB

    • MD5

      d2e30871dcb62e750fa748326a9d683d

    • SHA1

      35c475a9efc4bdab2de7429d50d6a50d1af1a882

    • SHA256

      c79cee09172553b1c7f76598d29ee0f42610d680974ec1d1d034d8061e323a1f

    • SHA512

      ec59795ece454a269612d5256a21c860300e0fb707427f8a262eef4599503a0802cd71b9f384e995423e55538c8070a43cb26aade78c726e099af0053c84c2f5

    • SSDEEP

      1536:eEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:VY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks