General

  • Target

    JaffaCakes118_db40973350967a968b62c93e14954c66

  • Size

    89KB

  • Sample

    250110-fcjvdsvmeq

  • MD5

    db40973350967a968b62c93e14954c66

  • SHA1

    7c3df6c66ed0de7cf5171f1305b42d3533a41f00

  • SHA256

    7fceb51e054c356f8bac0dd1dbe0716cf1a1e11969be88746d7d6fa225b7910e

  • SHA512

    2e36ebe92ee9bca2f1ecaf1b419b8785c17b9a582f4e57893b6b65b71abf53001813b14b616106df57a7101a06d0b3f4fad2766d70f3d640308ef8690697a21e

  • SSDEEP

    1536:Mr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:u+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_db40973350967a968b62c93e14954c66

    • Size

      89KB

    • MD5

      db40973350967a968b62c93e14954c66

    • SHA1

      7c3df6c66ed0de7cf5171f1305b42d3533a41f00

    • SHA256

      7fceb51e054c356f8bac0dd1dbe0716cf1a1e11969be88746d7d6fa225b7910e

    • SHA512

      2e36ebe92ee9bca2f1ecaf1b419b8785c17b9a582f4e57893b6b65b71abf53001813b14b616106df57a7101a06d0b3f4fad2766d70f3d640308ef8690697a21e

    • SSDEEP

      1536:Mr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:u+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks