General
-
Target
8ac8ca5f8f65a2a4398962d13ffc9794_JaffaCakes118
-
Size
188KB
-
Sample
241103-ljyvsazpdw
-
MD5
8ac8ca5f8f65a2a4398962d13ffc9794
-
SHA1
3d1bb149abbf4a96fb6e517dae71acd45e85fb1e
-
SHA256
b581894f6bb2729613a44dc86713933c5528bd67b03d1e49593ec10b39450ad8
-
SHA512
86e8d5f529586a1a6be35b3c69051e83acd29810204ce61df519098f9b20bda0cdad7c649636ff9ea15d0d6cc6a6769b2c1ec694495707766e1f39df237c3938
-
SSDEEP
3072:OzDu72N0mOgi+R2jQzGnaBbQMX88U71QhbjgTgRuEr:UXCDjiGn/MX8J7mgqd
Static task
static1
Behavioral task
behavioral1
Sample
8ac8ca5f8f65a2a4398962d13ffc9794_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ac8ca5f8f65a2a4398962d13ffc9794_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://13.carnovirious.net/ponyz/gate.php
http://13.JONEMNOMINIK.NET/ponyz/gate.php
http://13.LOMERDASTER.NET/ponyz/gate.php
http://13.ZABAKARVESTER.NET/ponyz/gate.php
-
payload_url
http://ruff-it-systeme.de/6yKd7t.exe
http://calanda-kaelte.ch/WtzUF.exe
http://207.56.194.195/CuVKURD.exe
Targets
-
-
Target
8ac8ca5f8f65a2a4398962d13ffc9794_JaffaCakes118
-
Size
188KB
-
MD5
8ac8ca5f8f65a2a4398962d13ffc9794
-
SHA1
3d1bb149abbf4a96fb6e517dae71acd45e85fb1e
-
SHA256
b581894f6bb2729613a44dc86713933c5528bd67b03d1e49593ec10b39450ad8
-
SHA512
86e8d5f529586a1a6be35b3c69051e83acd29810204ce61df519098f9b20bda0cdad7c649636ff9ea15d0d6cc6a6769b2c1ec694495707766e1f39df237c3938
-
SSDEEP
3072:OzDu72N0mOgi+R2jQzGnaBbQMX88U71QhbjgTgRuEr:UXCDjiGn/MX8J7mgqd
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-