General

  • Target

    JaffaCakes118_ccb96c1c27772422a8b12a701dd20513

  • Size

    160KB

  • Sample

    250109-ttbr1atqgy

  • MD5

    ccb96c1c27772422a8b12a701dd20513

  • SHA1

    1cfac3318b08a72017cf17162dd66c8029de25b0

  • SHA256

    8d4aa7c67142650ddb1ea7175a9e5a404d2ec959eaa6e4b7db9f78b897d70719

  • SHA512

    30bf0ddee1e4ba9cd21ddf45d5a672f1e2025296490c81e2b6567fd9306c7597b1fb77e1749809022959261f72f5202f527bb94db74ddeeb3f1016a6b724f219

  • SSDEEP

    1536:rEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:YY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_ccb96c1c27772422a8b12a701dd20513

    • Size

      160KB

    • MD5

      ccb96c1c27772422a8b12a701dd20513

    • SHA1

      1cfac3318b08a72017cf17162dd66c8029de25b0

    • SHA256

      8d4aa7c67142650ddb1ea7175a9e5a404d2ec959eaa6e4b7db9f78b897d70719

    • SHA512

      30bf0ddee1e4ba9cd21ddf45d5a672f1e2025296490c81e2b6567fd9306c7597b1fb77e1749809022959261f72f5202f527bb94db74ddeeb3f1016a6b724f219

    • SSDEEP

      1536:rEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:YY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks