General

  • Target

    JaffaCakes118_d653be3a67c242cbbb3ab412804f6d2a

  • Size

    160KB

  • Sample

    250110-awglgswjh1

  • MD5

    d653be3a67c242cbbb3ab412804f6d2a

  • SHA1

    3411573d715ecd5ea07f4204d79442086cf79d6b

  • SHA256

    0d8fd3a6541f94154f5bab966c9d6e888f94dfb3f0fbaa418de2ad6017ffb125

  • SHA512

    97447f8f83d41bafd78bd3bc8a18ebbf7cbd7f418c48c2f020c7362d9765e9d7f39f9ce00428fd2dced26eaff3f3b4c8b8b103456d0520b85af53fd02684b2df

  • SSDEEP

    1536:XEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:0Y+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_d653be3a67c242cbbb3ab412804f6d2a

    • Size

      160KB

    • MD5

      d653be3a67c242cbbb3ab412804f6d2a

    • SHA1

      3411573d715ecd5ea07f4204d79442086cf79d6b

    • SHA256

      0d8fd3a6541f94154f5bab966c9d6e888f94dfb3f0fbaa418de2ad6017ffb125

    • SHA512

      97447f8f83d41bafd78bd3bc8a18ebbf7cbd7f418c48c2f020c7362d9765e9d7f39f9ce00428fd2dced26eaff3f3b4c8b8b103456d0520b85af53fd02684b2df

    • SSDEEP

      1536:XEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:0Y+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks