General
-
Target
063257b9115aa24060a36e910203f14d_JaffaCakes118
-
Size
40KB
-
Sample
241001-rsf9zstfrk
-
MD5
063257b9115aa24060a36e910203f14d
-
SHA1
5fc4f49abe3c7cf524de2de58dd7088a22d42a75
-
SHA256
45aeb03a12c0b47c24582e9033e3aa81daf05ce5f6938041cf2ddcf01d559198
-
SHA512
83281de6fcdfb1136d21ee848cfbed43fb9c9850bc5950e1bab9e6ca9328a30ffd64eba413b310b91fcf86dc7d11e77856d0870d9031728715a93318c157d9d2
-
SSDEEP
768:/L9ij6QGZcowu5InOI3LQ/19XwVK5V2UddZbXwclHKm5Jy+44s4Nn0Gx1Zl8wH6E:/YmFabtnOIs/1CwPt5sclh5J7ZyGbZ7
Static task
static1
Behavioral task
behavioral1
Sample
igo-android-320x480.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
igo-android-320x480.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://trueyogateacherblog.com/resp.php
http://rrshaw.com/resp.php
Targets
-
-
Target
igo-android-320x480.exe
-
Size
103KB
-
MD5
1107aad3f09e426d35b73dd82acd7d0d
-
SHA1
f5284fc60ece7e690a462ed6e4606a23c82d6bd1
-
SHA256
6cb06b8d0588df1e2a6f5888fcbcffb901de4bbbe9ccb37ed060ecda99ea9633
-
SHA512
030c85075d7a9107172f92494ad9cf89e3105253a9ec3c9c8c9198185c3adfff99818787889473b57a42a8c4b025ddee656073dcd8f1cc67ea6f0ac7926e647f
-
SSDEEP
768:SH5NNNNNNNNbNNNNNNNNbNNNNNNNNbNNNNNNNNbNNNNNNNNbNNNNNNNNbNNNNNN1:G0jLKpUpVOkz7e/dEWXt
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-