General

  • Target

    JaffaCakes118_fd8f695071d2cdf2e135716cd0d525ea

  • Size

    160KB

  • Sample

    250111-lkgynaxnem

  • MD5

    fd8f695071d2cdf2e135716cd0d525ea

  • SHA1

    18b98498e6f50b5a9228bc66010d02ad2265192c

  • SHA256

    31b56184af215cfd83616a4ea52ba22c02d0320c3033ad4e1f82ec57b129e175

  • SHA512

    7302a474cb2d66c10f48b71cdf659da95578df3f44324e1755ee55aaf4be0b7aee7a99ddc2ec9d64da5829f77923aa5ff160bac7bab9940a66a295c2af5c40c0

  • SSDEEP

    1536:REY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:aY+4MiIkLZJNAQ9J6v

Malware Config

Targets

    • Target

      JaffaCakes118_fd8f695071d2cdf2e135716cd0d525ea

    • Size

      160KB

    • MD5

      fd8f695071d2cdf2e135716cd0d525ea

    • SHA1

      18b98498e6f50b5a9228bc66010d02ad2265192c

    • SHA256

      31b56184af215cfd83616a4ea52ba22c02d0320c3033ad4e1f82ec57b129e175

    • SHA512

      7302a474cb2d66c10f48b71cdf659da95578df3f44324e1755ee55aaf4be0b7aee7a99ddc2ec9d64da5829f77923aa5ff160bac7bab9940a66a295c2af5c40c0

    • SSDEEP

      1536:REY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:aY+4MiIkLZJNAQ9J6v

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks