General

  • Target

    JaffaCakes118_e4908dcdca8b9f4a39dba14c876cec67

  • Size

    89KB

  • Sample

    250110-pw444swqhn

  • MD5

    e4908dcdca8b9f4a39dba14c876cec67

  • SHA1

    0e80e68da235d317d7d197f8ec8b831e0e78c9c2

  • SHA256

    2ee2c853a605622d93e3011f500235eefe6ff16b8bf2ec84c1e1b362ac0eafdd

  • SHA512

    61b0d38d6214f59b7e69fddfe9c5ca6e7b11fc8e4cd75e2970752e77045402099180821cc9f5b94ad1df7fbe76c9a31756ae39d868dfd0805fb6d706bab557c6

  • SSDEEP

    1536:Dr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:X+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_e4908dcdca8b9f4a39dba14c876cec67

    • Size

      89KB

    • MD5

      e4908dcdca8b9f4a39dba14c876cec67

    • SHA1

      0e80e68da235d317d7d197f8ec8b831e0e78c9c2

    • SHA256

      2ee2c853a605622d93e3011f500235eefe6ff16b8bf2ec84c1e1b362ac0eafdd

    • SHA512

      61b0d38d6214f59b7e69fddfe9c5ca6e7b11fc8e4cd75e2970752e77045402099180821cc9f5b94ad1df7fbe76c9a31756ae39d868dfd0805fb6d706bab557c6

    • SSDEEP

      1536:Dr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:X+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks