General
-
Target
7d4bc2cee799ee860c38555b83de5aed_JaffaCakes118
-
Size
125KB
-
Sample
241030-a5yala1rav
-
MD5
7d4bc2cee799ee860c38555b83de5aed
-
SHA1
67cc37c4cc5633820850b0b7e9726b00e51b878d
-
SHA256
dfacf9c44251a3a2ea7b69fd2b40a7f3aefd7226a8f385a981dc3ec7c2229610
-
SHA512
2134ac40a20c66703ea3dc5ec80cdbf7e7a7bdfa07b04362aeba204d6ea59d08862390b0f5410c088138a8e6cbbb7feb204e46b237e0ddd53baf3c8968ef21e3
-
SSDEEP
3072:axvPuN3il7MOslhIiaQsctckYx8hcF/MdoQh1AQ:axveTOsl59scJL6tMNT
Static task
static1
Behavioral task
behavioral1
Sample
7d4bc2cee799ee860c38555b83de5aed_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7d4bc2cee799ee860c38555b83de5aed_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://rolex11.serverthuis.nl/po2/gate.php
http://rolex12.serverthuis.nl/po2/gate.php
http://rolex13.serverthuis.nl/po2/gate.php
http://rolex14.serverthuis.nl/po2/gate.php
http://rolex15.serverthuis.nl/po2/gate.php
-
payload_url
http://skin.mad.buttobi.net/11.exe
http://skin.mad.buttobi.net/22.exe
http://skin.mad.buttobi.net/33.exe
Targets
-
-
Target
7d4bc2cee799ee860c38555b83de5aed_JaffaCakes118
-
Size
125KB
-
MD5
7d4bc2cee799ee860c38555b83de5aed
-
SHA1
67cc37c4cc5633820850b0b7e9726b00e51b878d
-
SHA256
dfacf9c44251a3a2ea7b69fd2b40a7f3aefd7226a8f385a981dc3ec7c2229610
-
SHA512
2134ac40a20c66703ea3dc5ec80cdbf7e7a7bdfa07b04362aeba204d6ea59d08862390b0f5410c088138a8e6cbbb7feb204e46b237e0ddd53baf3c8968ef21e3
-
SSDEEP
3072:axvPuN3il7MOslhIiaQsctckYx8hcF/MdoQh1AQ:axveTOsl59scJL6tMNT
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-