General

  • Target

    JaffaCakes118_eb3651e28021ee5ff712b340eacafd03

  • Size

    34KB

  • Sample

    250110-w9whfsslbt

  • MD5

    eb3651e28021ee5ff712b340eacafd03

  • SHA1

    fe939cdfb03f06b8e5c441008a943c68ddfaf38d

  • SHA256

    9c098e84af7e0cfe50a24ce699c95d69ac395ef908bcb52aa657dbcbfbd3e397

  • SHA512

    7f129ba7472b8de988046e1c875d7ff371e788547648f666b771fdf50e38b121dedb61f6c015803ade2afe58c9d4ad4e28d4656a665c532c1fa8f667476862f1

  • SSDEEP

    768:1p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:1pYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_eb3651e28021ee5ff712b340eacafd03

    • Size

      34KB

    • MD5

      eb3651e28021ee5ff712b340eacafd03

    • SHA1

      fe939cdfb03f06b8e5c441008a943c68ddfaf38d

    • SHA256

      9c098e84af7e0cfe50a24ce699c95d69ac395ef908bcb52aa657dbcbfbd3e397

    • SHA512

      7f129ba7472b8de988046e1c875d7ff371e788547648f666b771fdf50e38b121dedb61f6c015803ade2afe58c9d4ad4e28d4656a665c532c1fa8f667476862f1

    • SSDEEP

      768:1p22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:1pYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks