General
-
Target
78394e6d77a24c1f13fac02c8df80270_JaffaCakes118
-
Size
116KB
-
Sample
241028-hgf1eatbnk
-
MD5
78394e6d77a24c1f13fac02c8df80270
-
SHA1
5a4dc56b1477f8c842affbce3a84b75cee141ddc
-
SHA256
f211064317fa035b037fb81fbbec7ece0c946ddd3ce29558042d63012884039d
-
SHA512
db7c723ceb466d1700e88fb471c998309d5f0caf1dadb9376ba1b6e6c300b8ef9324a505ae5fd204785437ecc637ea9fdafe38670e9201f0ed0d0a7516395879
-
SSDEEP
1536:n02pVTuvieSH9Qpt8Wk/Z+6gCP+X+yAGk2Kq/QLNtCwjlTaMuLaeqsFm:n00VxBH9Qt8WeZLgCPRlG1ILJJulTF
Static task
static1
Behavioral task
behavioral1
Sample
78394e6d77a24c1f13fac02c8df80270_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
78394e6d77a24c1f13fac02c8df80270_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://aaronreid.us/forum/viewtopic.php
http://bethclougherty.com/forum/viewtopic.php
http://dennisreid.com/forum/viewtopic.php
http://dennisreid.us/forum/viewtopic.php
-
payload_url
http://myhandymanutah.com/1L4h.exe
http://68.228.8.88/GG0sqZw9.exe
http://academicjourneyonline.com/ExA.exe
http://excellsportschiro.com/X0wose.exe
Targets
-
-
Target
78394e6d77a24c1f13fac02c8df80270_JaffaCakes118
-
Size
116KB
-
MD5
78394e6d77a24c1f13fac02c8df80270
-
SHA1
5a4dc56b1477f8c842affbce3a84b75cee141ddc
-
SHA256
f211064317fa035b037fb81fbbec7ece0c946ddd3ce29558042d63012884039d
-
SHA512
db7c723ceb466d1700e88fb471c998309d5f0caf1dadb9376ba1b6e6c300b8ef9324a505ae5fd204785437ecc637ea9fdafe38670e9201f0ed0d0a7516395879
-
SSDEEP
1536:n02pVTuvieSH9Qpt8Wk/Z+6gCP+X+yAGk2Kq/QLNtCwjlTaMuLaeqsFm:n00VxBH9Qt8WeZLgCPRlG1ILJJulTF
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-