General
-
Target
46f02ad9a522b2335cfba9ab188eb604_JaffaCakes118
-
Size
126KB
-
Sample
241015-k6f3tazern
-
MD5
46f02ad9a522b2335cfba9ab188eb604
-
SHA1
a327929e6b950e8cc8d93fa496b75a7451088262
-
SHA256
d9daac92f2918737514d47ab295ef06788e0543cec72cbc9d7266ff5c487f834
-
SHA512
93b3d07d245c1d34774d8737c72374a19164669a8adb5ea48d1b8a73c6e3f2ccb87dbefd007eb3df3a069dd9fc3a834527bc4fde7c3eb7149b636bae2241b377
-
SSDEEP
3072:W1hyoJnDFn/Wr9rz0ya+HCeWR/X/qPpKRcZOkeMOMW:WTbnzaiLRXZQOkFq
Static task
static1
Behavioral task
behavioral1
Sample
pdf_trkRW184018395CA.scr
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
pdf_trkRW184018395CA.scr
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://84.22.106.99/vbulletin/profile.php
-
payload_url
http://johnsonrose.ca/sohoadmin/config/flsh.exe
Targets
-
-
Target
pdf_trkRW184018395CA.scr
-
Size
184KB
-
MD5
17f79adb21b0cec082466ef5c08d38da
-
SHA1
0d8c269c847331295cdabed69582252fbff42d0e
-
SHA256
923e6bc32c344882732d92f753ebf21701eaad45ca8effb03f5d13ccc3fe9b1c
-
SHA512
2f4b5601025e476dd042bea0b01a33aebe4cf0b39417635905d785aac7901dca46a5446c6cb79af0a449726bff3af5fde910dfc3ae466b45df0320f67e522133
-
SSDEEP
3072:LOVIaiMMJouOkSe65Ozp8q+aL8X63OaggY9:LOd5MJXjp8qTIX63gx
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-