General

  • Target

    JaffaCakes118_f3264cbd54dee6100118b22c09a3251c

  • Size

    89KB

  • Sample

    250111-blql3swpfs

  • MD5

    f3264cbd54dee6100118b22c09a3251c

  • SHA1

    4c96e95d86e72aeebcb61ceccdd22e9c9e898c33

  • SHA256

    2547f2839e8bed94cb840e417e7d47670f1665ee6448b2ed98a63f5c47e85744

  • SHA512

    8a682cdf585921238ccefe8c2e5a4d7c346962ff842e132eb8ed8fc675c25473705064a49a7b025fd61a44030f27d80814858f3b5c80605e34665bee8efb1bf3

  • SSDEEP

    1536:xr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:1+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_f3264cbd54dee6100118b22c09a3251c

    • Size

      89KB

    • MD5

      f3264cbd54dee6100118b22c09a3251c

    • SHA1

      4c96e95d86e72aeebcb61ceccdd22e9c9e898c33

    • SHA256

      2547f2839e8bed94cb840e417e7d47670f1665ee6448b2ed98a63f5c47e85744

    • SHA512

      8a682cdf585921238ccefe8c2e5a4d7c346962ff842e132eb8ed8fc675c25473705064a49a7b025fd61a44030f27d80814858f3b5c80605e34665bee8efb1bf3

    • SSDEEP

      1536:xr+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:1+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks