General

  • Target

    JaffaCakes118_d1b5bb05bf5634466b30a4afbeebfbfa

  • Size

    36KB

  • Sample

    250109-zbb8pszpes

  • MD5

    d1b5bb05bf5634466b30a4afbeebfbfa

  • SHA1

    86b8e11757cfd64ab0020fc337c238d0639e4445

  • SHA256

    2f4eb523f9d6f6b0563fc24027d3fcef6424eda8562b683f628cde085c53d8ad

  • SHA512

    e293e6e458eb0089908547b32c419902d00421f03f41b28f27824b15af1bcf9783686e93b2883df2b6f70c6c62cfd62adb5a775d3a7f7143b0a7f7c57ac569d1

  • SSDEEP

    768:Dp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J:DpYoX58z1uirL98xMWnT0OQ9J

Malware Config

Targets

    • Target

      JaffaCakes118_d1b5bb05bf5634466b30a4afbeebfbfa

    • Size

      36KB

    • MD5

      d1b5bb05bf5634466b30a4afbeebfbfa

    • SHA1

      86b8e11757cfd64ab0020fc337c238d0639e4445

    • SHA256

      2f4eb523f9d6f6b0563fc24027d3fcef6424eda8562b683f628cde085c53d8ad

    • SHA512

      e293e6e458eb0089908547b32c419902d00421f03f41b28f27824b15af1bcf9783686e93b2883df2b6f70c6c62cfd62adb5a775d3a7f7143b0a7f7c57ac569d1

    • SSDEEP

      768:Dp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J:DpYoX58z1uirL98xMWnT0OQ9J

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks