General

  • Target

    JaffaCakes118_f289c83746a93cde20b78d781f4e59d4

  • Size

    34KB

  • Sample

    250111-a2df1sxqdj

  • MD5

    f289c83746a93cde20b78d781f4e59d4

  • SHA1

    5407cac585162fab01e19ec06dc5300c6229bba6

  • SHA256

    a5a707fd5fb89d090d421259fb2bd2c96f95b1947fccace1db372cea6a5e2309

  • SHA512

    db1aa4180254aafc8c3df6a396f991c64af9d4aa95e9967f77e98060b35bb7e70ac481ff13ee4238ff586948d78353f890f033ce43a3a08a9018269e9dc8bfc0

  • SSDEEP

    768:ip22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:ipYoX58z1uirL98xMWnT0OQ9J2

Malware Config

Targets

    • Target

      JaffaCakes118_f289c83746a93cde20b78d781f4e59d4

    • Size

      34KB

    • MD5

      f289c83746a93cde20b78d781f4e59d4

    • SHA1

      5407cac585162fab01e19ec06dc5300c6229bba6

    • SHA256

      a5a707fd5fb89d090d421259fb2bd2c96f95b1947fccace1db372cea6a5e2309

    • SHA512

      db1aa4180254aafc8c3df6a396f991c64af9d4aa95e9967f77e98060b35bb7e70ac481ff13ee4238ff586948d78353f890f033ce43a3a08a9018269e9dc8bfc0

    • SSDEEP

      768:ip22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J2:ipYoX58z1uirL98xMWnT0OQ9J2

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks