General

  • Target

    JaffaCakes118_f568c389a0d53e38051d1a2d2b69d385

  • Size

    89KB

  • Sample

    250111-dqergstnak

  • MD5

    f568c389a0d53e38051d1a2d2b69d385

  • SHA1

    b8bc782ac97efd4e92317cd4a30281b2e4f55094

  • SHA256

    e1bba3d4920edc6e4044e4de304363b0b0444881abe2cab8cda5db54a4234c19

  • SHA512

    b6cfba456e60e28a496af186da6a42ad6d7b186896893240117cd734d3df34fc0b4afa4fc59f33ce3e81fedbf6f0739ec8e93da05ee253940d6e366e8186886b

  • SSDEEP

    1536:2r+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:4+4MJIkLZJNAQ9Jo9e

Malware Config

Targets

    • Target

      JaffaCakes118_f568c389a0d53e38051d1a2d2b69d385

    • Size

      89KB

    • MD5

      f568c389a0d53e38051d1a2d2b69d385

    • SHA1

      b8bc782ac97efd4e92317cd4a30281b2e4f55094

    • SHA256

      e1bba3d4920edc6e4044e4de304363b0b0444881abe2cab8cda5db54a4234c19

    • SHA512

      b6cfba456e60e28a496af186da6a42ad6d7b186896893240117cd734d3df34fc0b4afa4fc59f33ce3e81fedbf6f0739ec8e93da05ee253940d6e366e8186886b

    • SSDEEP

      1536:2r+mFM2HXKZgixhIksu+XM5/HtAQ9Jox7e:4+4MJIkLZJNAQ9Jo9e

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks