General

  • Target

    JaffaCakes118_e73fa2f2c0e062f3aea89ee30b44d8c0

  • Size

    160KB

  • Sample

    250110-sfx8eaxqct

  • MD5

    e73fa2f2c0e062f3aea89ee30b44d8c0

  • SHA1

    30c8c7dc56a14cd22d00aa776803143a721ed4fc

  • SHA256

    67161efa34f8be295c8f952650e358debe503ddc38ab3fa08d456170050a9285

  • SHA512

    836ffcaa3f230792dee5fa51fdaafc9a0b87b3ae03b75027f0224431a7a8f6f227cfede11ccc53c57130025a98f34ffd326f20efdfec6a839e9c15637455570f

  • SSDEEP

    1536:gEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:TY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_e73fa2f2c0e062f3aea89ee30b44d8c0

    • Size

      160KB

    • MD5

      e73fa2f2c0e062f3aea89ee30b44d8c0

    • SHA1

      30c8c7dc56a14cd22d00aa776803143a721ed4fc

    • SHA256

      67161efa34f8be295c8f952650e358debe503ddc38ab3fa08d456170050a9285

    • SHA512

      836ffcaa3f230792dee5fa51fdaafc9a0b87b3ae03b75027f0224431a7a8f6f227cfede11ccc53c57130025a98f34ffd326f20efdfec6a839e9c15637455570f

    • SSDEEP

      1536:gEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:TY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks