General

  • Target

    JaffaCakes118_ed4660502ccd985130c7cdd493dc1154

  • Size

    160KB

  • Sample

    250110-y4f7pavrev

  • MD5

    ed4660502ccd985130c7cdd493dc1154

  • SHA1

    66643c3f0fc8db7548ad381b1ce274ea0a086122

  • SHA256

    18e7dbe94c4050fb80066abca7353755967a1d5d3f16ff510fc93dc35ac9a6cf

  • SHA512

    db2349bf453d0b0323073799bcd35713f7fac0f025d8e28c04d820f20f1f95a1a1e7b3577e9bb9d156b4e9950ca2f5faaee7384b0400839353a0dc8a839706d9

  • SSDEEP

    1536:AEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:zY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_ed4660502ccd985130c7cdd493dc1154

    • Size

      160KB

    • MD5

      ed4660502ccd985130c7cdd493dc1154

    • SHA1

      66643c3f0fc8db7548ad381b1ce274ea0a086122

    • SHA256

      18e7dbe94c4050fb80066abca7353755967a1d5d3f16ff510fc93dc35ac9a6cf

    • SHA512

      db2349bf453d0b0323073799bcd35713f7fac0f025d8e28c04d820f20f1f95a1a1e7b3577e9bb9d156b4e9950ca2f5faaee7384b0400839353a0dc8a839706d9

    • SSDEEP

      1536:AEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:zY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks