General

  • Target

    JaffaCakes118_fde9294eeae1d6bf5f513c0af243a768

  • Size

    36KB

  • Sample

    250111-lv22ksxrfj

  • MD5

    fde9294eeae1d6bf5f513c0af243a768

  • SHA1

    dbfc624b07d1e5b092a423a62d64e388d48acb4c

  • SHA256

    8dc4087b1dbffa1b4e30cde354d912d15f1febbfd04596315fd1dd79ce56b804

  • SHA512

    11760679735551b19809605448446ac9e685465de8f558bd0c1b763f93221ea1ec126c152af7cea7e291230c1a4262f5a081373553675f0028ed0f502f4ac096

  • SSDEEP

    768:fp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J:fpYoX58z1uirL98xMWnT0OQ9J

Malware Config

Targets

    • Target

      JaffaCakes118_fde9294eeae1d6bf5f513c0af243a768

    • Size

      36KB

    • MD5

      fde9294eeae1d6bf5f513c0af243a768

    • SHA1

      dbfc624b07d1e5b092a423a62d64e388d48acb4c

    • SHA256

      8dc4087b1dbffa1b4e30cde354d912d15f1febbfd04596315fd1dd79ce56b804

    • SHA512

      11760679735551b19809605448446ac9e685465de8f558bd0c1b763f93221ea1ec126c152af7cea7e291230c1a4262f5a081373553675f0028ed0f502f4ac096

    • SSDEEP

      768:fp22qWFcy5XQ7lO41uirwA98p3MpkNBxd0cJWV6dy/x9J:fpYoX58z1uirL98xMWnT0OQ9J

    • Tinba / TinyBanker

      Banking trojan which uses packet sniffing to steal data.

    • Tinba family

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks