General

  • Target

    JaffaCakes118_e36ee25a886ab47d94668ba8c0752178

  • Size

    34KB

  • Sample

    250110-nx6tnatkcz

  • MD5

    e36ee25a886ab47d94668ba8c0752178

  • SHA1

    8a4cdcbf80b943ef96839b2d2144552e9d3f8623

  • SHA256

    3ba37eb8b1b9e8e2f8b755bac1d54e6715fe3f378ca5dca463a8a99e9e9a97cd

  • SHA512

    3b237ccc2740381d46848eacafe589fee662bbe63edce4e95d750c4ff5704d8e9bf3b827581d44fd59b877db6b74759b06557a8f43e40f6046807a81ff0882f1

  • SSDEEP

    768:Qp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:QpYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_e36ee25a886ab47d94668ba8c0752178

    • Size

      34KB

    • MD5

      e36ee25a886ab47d94668ba8c0752178

    • SHA1

      8a4cdcbf80b943ef96839b2d2144552e9d3f8623

    • SHA256

      3ba37eb8b1b9e8e2f8b755bac1d54e6715fe3f378ca5dca463a8a99e9e9a97cd

    • SHA512

      3b237ccc2740381d46848eacafe589fee662bbe63edce4e95d750c4ff5704d8e9bf3b827581d44fd59b877db6b74759b06557a8f43e40f6046807a81ff0882f1

    • SSDEEP

      768:Qp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:QpYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks