General

  • Target

    JaffaCakes118_d7a158528d8f5bcb1d162756abe5a930

  • Size

    34KB

  • Sample

    250110-b5ghhszlfq

  • MD5

    d7a158528d8f5bcb1d162756abe5a930

  • SHA1

    3e933cc7507b007e13ac8dc06af6437aa3eead9b

  • SHA256

    8064eebb7e87256c9356e47495b031a9180c5579bd56d12c8ecf3ecb53f6e983

  • SHA512

    c5f1a0f3fea0749431e477d128f27890be286a277644ec70c3185db1d81a97cd73630432bf2ad02907679dbb15b6ce81800f64ebfacdaac1cb68556d767e7810

  • SSDEEP

    768:jp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:jpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_d7a158528d8f5bcb1d162756abe5a930

    • Size

      34KB

    • MD5

      d7a158528d8f5bcb1d162756abe5a930

    • SHA1

      3e933cc7507b007e13ac8dc06af6437aa3eead9b

    • SHA256

      8064eebb7e87256c9356e47495b031a9180c5579bd56d12c8ecf3ecb53f6e983

    • SHA512

      c5f1a0f3fea0749431e477d128f27890be286a277644ec70c3185db1d81a97cd73630432bf2ad02907679dbb15b6ce81800f64ebfacdaac1cb68556d767e7810

    • SSDEEP

      768:jp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:jpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks