General
-
Target
eed15524d792231857eddc3b31bdd990_JaffaCakes118
-
Size
89KB
-
Sample
240921-bxvp6sygml
-
MD5
eed15524d792231857eddc3b31bdd990
-
SHA1
87c338bf9035c8df2dcb44c5aa71df5867474edb
-
SHA256
d63bb647e53855baf6c0104fd7319e96f8ce80542b2ad98f514003522ac9a861
-
SHA512
67a8edd6bfe2ec3aa390a571029386309d80cac8a914877510a321fdc7c0006d7324432b91789cb6789d5ed91160ee454d046e018077dcef5c4231d3df435fb8
-
SSDEEP
1536:wBy3ePwUPqTB285AFouyRZeuWT7uSdfxg4OXMhBTvTEI2kzZH:+y1UXeuyRUuWXPbOXsJEIZH
Behavioral task
behavioral1
Sample
eed15524d792231857eddc3b31bdd990_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eed15524d792231857eddc3b31bdd990_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://br1.irontrial.com:8080/ponyb/gate.php
http://br1.pineapplesdonthavesleeves.com:8080/ponyb/gate.php
http://89.166.50.40:8080/ponyb/gate.php
http://6.magicalomaha.com/ponyb/gate.php
-
payload_url
http://gleeclub.bplaced.net/eHeSq.exe
http://mybuss.com.mx/bvpVa0E.exe
http://blazingindustrial.net/eKcV.exe
http://khioffices.com/T4Li.exe
Targets
-
-
Target
eed15524d792231857eddc3b31bdd990_JaffaCakes118
-
Size
89KB
-
MD5
eed15524d792231857eddc3b31bdd990
-
SHA1
87c338bf9035c8df2dcb44c5aa71df5867474edb
-
SHA256
d63bb647e53855baf6c0104fd7319e96f8ce80542b2ad98f514003522ac9a861
-
SHA512
67a8edd6bfe2ec3aa390a571029386309d80cac8a914877510a321fdc7c0006d7324432b91789cb6789d5ed91160ee454d046e018077dcef5c4231d3df435fb8
-
SSDEEP
1536:wBy3ePwUPqTB285AFouyRZeuWT7uSdfxg4OXMhBTvTEI2kzZH:+y1UXeuyRUuWXPbOXsJEIZH
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-