General
-
Target
4b1533f436d99882edb3f9df54315e1b_JaffaCakes118
-
Size
146KB
-
Sample
240729-rgs5ea1hpl
-
MD5
4b1533f436d99882edb3f9df54315e1b
-
SHA1
439d8bc5cd4069268fb98ea52bf69d0587060b46
-
SHA256
00dde1b211b082e6f1f0b24ed99cff4e36122b24fbc1f23dc38b340f3e26fa34
-
SHA512
27bef5bd5faf172b53d978a5068dffa64110e4928c35e27a022227b641b8901110c90182fd0c4d7f4f91aefead185edfb6acbe0f1a8120e0363851a6d6238907
-
SSDEEP
3072:M3X8VbyArgxioOflznAVE/7Ezrmk1ShH:MiWA8gzAVS7CS
Static task
static1
Behavioral task
behavioral1
Sample
4b1533f436d99882edb3f9df54315e1b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4b1533f436d99882edb3f9df54315e1b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
pony
http://lumberlandnorth.com:8080/ponyz/gate.php
http://mini101.ca:8080/ponyz/gate.php
http://biogenx.net:8080/ponyz/gate.php
http://datingandfriendfinder.net:8080/ponyz/gate.php
-
payload_url
http://transfer.gfh-net.de/m4BVR.exe
http://netsupply.com.do/Gpwv.exe
http://www.cral-ulss15.it/hBjw1x.exe
Targets
-
-
Target
4b1533f436d99882edb3f9df54315e1b_JaffaCakes118
-
Size
146KB
-
MD5
4b1533f436d99882edb3f9df54315e1b
-
SHA1
439d8bc5cd4069268fb98ea52bf69d0587060b46
-
SHA256
00dde1b211b082e6f1f0b24ed99cff4e36122b24fbc1f23dc38b340f3e26fa34
-
SHA512
27bef5bd5faf172b53d978a5068dffa64110e4928c35e27a022227b641b8901110c90182fd0c4d7f4f91aefead185edfb6acbe0f1a8120e0363851a6d6238907
-
SSDEEP
3072:M3X8VbyArgxioOflznAVE/7Ezrmk1ShH:MiWA8gzAVS7CS
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-