General
-
Target
7df2db6e631e2fe7e8d25110044c38b8_JaffaCakes118
-
Size
188KB
-
Sample
241030-ffkk4avrdy
-
MD5
7df2db6e631e2fe7e8d25110044c38b8
-
SHA1
24671e95800fce95d717abbbc257bf3fd78c2546
-
SHA256
8baac3e732171c6a43d03088dc1c3449271990b6de2f3279ba85ad8d897f72c1
-
SHA512
3025174d10229c825953f821c7cad88c3f760d3cac5020411162d12e4b4fa51f920759cb783882291df0b5b3fff51bf3ad543239c076416b293c7ebcbbffde6b
-
SSDEEP
3072:uE1Yv6deFRNfMZU3t+PW1+1W3v1QRbjTp8OVioCr:uEZUMq3D1+1Qvm9xVY
Static task
static1
Behavioral task
behavioral1
Sample
7df2db6e631e2fe7e8d25110044c38b8_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
7df2db6e631e2fe7e8d25110044c38b8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://13.carnovirious.net/ponyb/gate.php
http://13.JONEMNOMINIK.NET/ponyb/gate.php
http://13.LOMERDASTER.NET/ponyb/gate.php
http://13.ZABAKARVESTER.NET/ponyb/gate.php
-
payload_url
http://www.ptci-md.org/gbQ2o1H.exe
http://www.abn-capital.com/PfH.exe
http://cancunie.com/v2km.exe
Targets
-
-
Target
7df2db6e631e2fe7e8d25110044c38b8_JaffaCakes118
-
Size
188KB
-
MD5
7df2db6e631e2fe7e8d25110044c38b8
-
SHA1
24671e95800fce95d717abbbc257bf3fd78c2546
-
SHA256
8baac3e732171c6a43d03088dc1c3449271990b6de2f3279ba85ad8d897f72c1
-
SHA512
3025174d10229c825953f821c7cad88c3f760d3cac5020411162d12e4b4fa51f920759cb783882291df0b5b3fff51bf3ad543239c076416b293c7ebcbbffde6b
-
SSDEEP
3072:uE1Yv6deFRNfMZU3t+PW1+1W3v1QRbjTp8OVioCr:uEZUMq3D1+1Qvm9xVY
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-