General

  • Target

    JaffaCakes118_ea4d3aff188f869dc0f57b04a5457f03

  • Size

    160KB

  • Sample

    250110-wde6la1mas

  • MD5

    ea4d3aff188f869dc0f57b04a5457f03

  • SHA1

    4cf117fcec69f24f7d8a146cd5ddf96f3a579b21

  • SHA256

    ac2787c4dd83f872810f4cfbf188efbf1b974a9bc97a13b7a5271424de5622e5

  • SHA512

    e1c3454096365f4fb01c31d0c4296b2dfb0508ba129513d86c4c5790f0eaa5081c046415d0b6f7f335f49115d92377670ac11f190ca443ebf802c3f91ec92cd5

  • SSDEEP

    1536:DEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:AY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_ea4d3aff188f869dc0f57b04a5457f03

    • Size

      160KB

    • MD5

      ea4d3aff188f869dc0f57b04a5457f03

    • SHA1

      4cf117fcec69f24f7d8a146cd5ddf96f3a579b21

    • SHA256

      ac2787c4dd83f872810f4cfbf188efbf1b974a9bc97a13b7a5271424de5622e5

    • SHA512

      e1c3454096365f4fb01c31d0c4296b2dfb0508ba129513d86c4c5790f0eaa5081c046415d0b6f7f335f49115d92377670ac11f190ca443ebf802c3f91ec92cd5

    • SSDEEP

      1536:DEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:AY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks