General
-
Target
15144fcbf07b6732b3619c9e44d3b05f_JaffaCakes118
-
Size
261KB
-
Sample
241004-1z52csyenm
-
MD5
15144fcbf07b6732b3619c9e44d3b05f
-
SHA1
1cd6ef2f57755e645ed4f50818ad81cab0c80dc7
-
SHA256
8ce0be4b54e1c13c45bbbb1a0b69058ee6e5f0c9a2aa49d06c27b4239f1defed
-
SHA512
78a8f5ce42fdfc9e165766f6a0dfc2405acf9ed85bb43c403beac748ef16fa59170fe909fe0a338fff292d05809b595d67d1030a0ce4f200b7af34c9b89dac05
-
SSDEEP
6144:+BnRq2LEy6xnKsj3PgMyWB0dbk9YF18N6/G26XAi9pRwW4gzEwPKqx:+BRzmKsfv3BGIwK6O2m79nXEu
Static task
static1
Behavioral task
behavioral1
Sample
payment.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
payment.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
pony
http://204.188.238.141/~paulcomp/js/paul.php
Targets
-
-
Target
payment.exe
-
Size
620KB
-
MD5
3b2b3d6095585b2f31674d484d6d34ff
-
SHA1
393fbd4ba2bc44d647c588c868fd4662dcb7a54d
-
SHA256
a8ba3f889b509af56ac982f9410bd94a00e26cdef549586728f63fab88fbf0c5
-
SHA512
a0973df1add80c52e935292ddb86b76f49a24c3a777d1f1618e2e3b4eaffcb214dcd07d1ec644001bc0700d16a1a75c43aa24b9e71613589ed89e202643eee00
-
SSDEEP
6144:3UEjebs98Z4NBBGDWMKvS8JnWJ1t8N6/G26/Ai9pRwK4kzEqPKu:kPQ6QvS8JWvtK6O2Q79nzEe
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-