General

  • Target

    JaffaCakes118_cba5cb767bab243da124616f665b53cc

  • Size

    34KB

  • Sample

    250109-st5veasrht

  • MD5

    cba5cb767bab243da124616f665b53cc

  • SHA1

    3e1157e71c5fb61bd7027c7c69a1fd420bc15330

  • SHA256

    0aad8e3326bb0685465cd130f41ad0774c040aa55333bfd8076fb0e194e710a9

  • SHA512

    03440b5531c6b3926df1521477a2149aba08ab535fd3bc0a3c847d8646f82e9fd99a49f1f861571c8175c15e2c70e1e2f2c8ea957e77171a4ff1935f31932beb

  • SSDEEP

    768:0p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:0pYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_cba5cb767bab243da124616f665b53cc

    • Size

      34KB

    • MD5

      cba5cb767bab243da124616f665b53cc

    • SHA1

      3e1157e71c5fb61bd7027c7c69a1fd420bc15330

    • SHA256

      0aad8e3326bb0685465cd130f41ad0774c040aa55333bfd8076fb0e194e710a9

    • SHA512

      03440b5531c6b3926df1521477a2149aba08ab535fd3bc0a3c847d8646f82e9fd99a49f1f861571c8175c15e2c70e1e2f2c8ea957e77171a4ff1935f31932beb

    • SSDEEP

      768:0p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:0pYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks