General
-
Target
a0ecccb802bd69797e5c742c812cf820_JaffaCakes118
-
Size
151KB
-
Sample
240817-dadt9awfjr
-
MD5
a0ecccb802bd69797e5c742c812cf820
-
SHA1
700278f755b4c59d8af3b14ec707939a5bd7b099
-
SHA256
05a5092b52b2d5d18a302fa246f085d6ebcb9a7132365e5de54880347f62cf39
-
SHA512
0ea6fdde69224befce4eb90ea9a92610fbd4999ea87b85003d34a6c6c071dd5ab4e4e37a102af0718d86845d1bf292909040cfd8979b0a327f7b734efee924fc
-
SSDEEP
3072:pK7pS4GXhfwuq9O8y+FG53ZDw+EGzDS/1GTaDZT8WWxDgc2UVbAnA9LcanJL0G6g:E+tcWb6ZKbBnMq
Static task
static1
Behavioral task
behavioral1
Sample
a0ecccb802bd69797e5c742c812cf820_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a0ecccb802bd69797e5c742c812cf820_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://67.215.225.205:8080/ponys/gate.php
http://216.231.139.111/ponys/gate.php
-
payload_url
http://123-engagement-ring.com/F2ziEErm.exe
http://sultanesmonterrey.com/6VRjCFx.exe
http://cafedoc.info/BxvUvh.exe
http://butelii-oxigen.ro/fojJM.exe
http://aurangabadproperties.com/rfoMUzmK.exe
Targets
-
-
Target
a0ecccb802bd69797e5c742c812cf820_JaffaCakes118
-
Size
151KB
-
MD5
a0ecccb802bd69797e5c742c812cf820
-
SHA1
700278f755b4c59d8af3b14ec707939a5bd7b099
-
SHA256
05a5092b52b2d5d18a302fa246f085d6ebcb9a7132365e5de54880347f62cf39
-
SHA512
0ea6fdde69224befce4eb90ea9a92610fbd4999ea87b85003d34a6c6c071dd5ab4e4e37a102af0718d86845d1bf292909040cfd8979b0a327f7b734efee924fc
-
SSDEEP
3072:pK7pS4GXhfwuq9O8y+FG53ZDw+EGzDS/1GTaDZT8WWxDgc2UVbAnA9LcanJL0G6g:E+tcWb6ZKbBnMq
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-