General
-
Target
92c784f7204b2ac77b6e185c00525dae_JaffaCakes118
-
Size
247KB
-
Sample
241124-f5cxjswmdz
-
MD5
92c784f7204b2ac77b6e185c00525dae
-
SHA1
ee7b6e18623b630f9bce1c88e812d67d394443ee
-
SHA256
b91858423438eac4acd750963c4852056a0a918c14625f2e31b0c20b8402bbba
-
SHA512
ca2b6be5f36c718c8f59441c6581ccd5d6bfc7a863aa660c1c84d0fbe8de925f3b082ecad01b3aafc17489324e7001a492c4de5b0131b7912ec931addef5549a
-
SSDEEP
6144:9Bw00dot11YrzGanKT6MKJksFzzd8N6/G26/Ai9pRwa4UzEsPK9EK8:/godcnK6IsFNK6O2679n/EfEl
Static task
static1
Behavioral task
behavioral1
Sample
payment.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
payment.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://204.188.238.141/~paulcomp/js/paul.php
Targets
-
-
Target
payment.exe
-
Size
596KB
-
MD5
f46692489366d27b40a12e4c4d1058ce
-
SHA1
0980baa1b2d3c28c37d82ccf38fa46dfc6c5b2d7
-
SHA256
aa3a264091c90d6817a63521c278377f4bc8611e25354be6502ddeee58459809
-
SHA512
4020018465035da32a38cbd7c5d2f79eb69d97fc8ad0c6df4395857120a0c0e945273d6818763fe6cc9b79cc5a1299737d7bc15c2a42f6810db0815ddb706f39
-
SSDEEP
6144:2z3XcK8UE+BBrOMO50kE3LzGanKT3SprbVu1t8N6/G26/Ai9pRwK4kzEqPKu:YXFUukcnKcItK6O2Q79nzEe
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-