General

  • Target

    JaffaCakes118_d589041bdfc1adbabfaaa7a333dd90d4

  • Size

    160KB

  • Sample

    250109-3vb9laxkbm

  • MD5

    d589041bdfc1adbabfaaa7a333dd90d4

  • SHA1

    70f7c06a22a0ae64127ec1b5903afbcdbf4dcc36

  • SHA256

    ba87769b40804b895b8b524fe9a45b44d51ceb4966088c57c79407c3dc4616bc

  • SHA512

    3ea1488eea9ff8c36f213ae2198c3b5fe227aa0097c09191e0962736df167f8218c82fa3ee88ace61c7d09fbb0653dec817a6b0da319cea7c9aa571dca06d452

  • SSDEEP

    1536:BEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:KY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_d589041bdfc1adbabfaaa7a333dd90d4

    • Size

      160KB

    • MD5

      d589041bdfc1adbabfaaa7a333dd90d4

    • SHA1

      70f7c06a22a0ae64127ec1b5903afbcdbf4dcc36

    • SHA256

      ba87769b40804b895b8b524fe9a45b44d51ceb4966088c57c79407c3dc4616bc

    • SHA512

      3ea1488eea9ff8c36f213ae2198c3b5fe227aa0097c09191e0962736df167f8218c82fa3ee88ace61c7d09fbb0653dec817a6b0da319cea7c9aa571dca06d452

    • SSDEEP

      1536:BEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:KY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks