General
-
Target
f25775505aac21a3b2f3c8bcb3f58021_JaffaCakes118
-
Size
153KB
-
Sample
240922-tfgfbsxgnj
-
MD5
f25775505aac21a3b2f3c8bcb3f58021
-
SHA1
9062cd1a3a4201bc22e0057bd22512e2f64ad456
-
SHA256
98019dcc5863e6ed0dca1f030e1012ebd4b10460b04ceacfc0e1b0cbc4d684e3
-
SHA512
25174d5b0d91b4020b93e505c1442fb9a67ff1ac31b957a45a6deca06c9a9381314b7eabd6b142d6c3e187f7034f0684dc6e1f0c3c0cc3f2ad932eddc01a725e
-
SSDEEP
3072:QGhG0qvTNFMJFHXQEkQkS6vmCNQMblOZhpwXuqOmg:QGhSvTNFMHHXQHQkjNVl4wXBz
Static task
static1
Behavioral task
behavioral1
Sample
f25775505aac21a3b2f3c8bcb3f58021_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f25775505aac21a3b2f3c8bcb3f58021_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://67.215.225.205:8080/ponys/gate.php
http://216.231.139.111/ponys/gate.php
-
payload_url
http://123-engagement-ring.com/F2ziEErm.exe
http://sultanesmonterrey.com/6VRjCFx.exe
http://cafedoc.info/BxvUvh.exe
http://butelii-oxigen.ro/fojJM.exe
http://aurangabadproperties.com/rfoMUzmK.exe
Targets
-
-
Target
f25775505aac21a3b2f3c8bcb3f58021_JaffaCakes118
-
Size
153KB
-
MD5
f25775505aac21a3b2f3c8bcb3f58021
-
SHA1
9062cd1a3a4201bc22e0057bd22512e2f64ad456
-
SHA256
98019dcc5863e6ed0dca1f030e1012ebd4b10460b04ceacfc0e1b0cbc4d684e3
-
SHA512
25174d5b0d91b4020b93e505c1442fb9a67ff1ac31b957a45a6deca06c9a9381314b7eabd6b142d6c3e187f7034f0684dc6e1f0c3c0cc3f2ad932eddc01a725e
-
SSDEEP
3072:QGhG0qvTNFMJFHXQEkQkS6vmCNQMblOZhpwXuqOmg:QGhSvTNFMHHXQHQkjNVl4wXBz
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-