General
-
Target
a30005a5b61f675c198d9dacf57cb6c8_JaffaCakes118
-
Size
188KB
-
Sample
241126-t4cr2syrez
-
MD5
a30005a5b61f675c198d9dacf57cb6c8
-
SHA1
57686d4363ccdc922a718a946431132257995a9c
-
SHA256
613ec775afa2641a00693e2f27a151df0f25f01b583cd396e0f1bcf06ca48129
-
SHA512
e76a68d7fccbca2b9bacf646cd038a2e7f3811214011ef02089d1dc54052f4659226721bf12919fcce83b04755231940a1ab2a3415cad0f6358e9996b1bfa6ae
-
SSDEEP
3072:Ofnu72N0mOgi+R2jQzGnaBbQMX88U71QhbjgTgRuEm:4XCDjiGn/MX8J7mgqQ
Static task
static1
Behavioral task
behavioral1
Sample
a30005a5b61f675c198d9dacf57cb6c8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a30005a5b61f675c198d9dacf57cb6c8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://13.carnovirious.net/ponyz/gate.php
http://13.JONEMNOMINIK.NET/ponyz/gate.php
http://13.LOMERDASTER.NET/ponyz/gate.php
http://13.ZABAKARVESTER.NET/ponyz/gate.php
-
payload_url
http://ruff-it-systeme.de/6yKd7t.exe
http://calanda-kaelte.ch/WtzUF.exe
http://207.56.194.195/CuVKURD.exe
Targets
-
-
Target
a30005a5b61f675c198d9dacf57cb6c8_JaffaCakes118
-
Size
188KB
-
MD5
a30005a5b61f675c198d9dacf57cb6c8
-
SHA1
57686d4363ccdc922a718a946431132257995a9c
-
SHA256
613ec775afa2641a00693e2f27a151df0f25f01b583cd396e0f1bcf06ca48129
-
SHA512
e76a68d7fccbca2b9bacf646cd038a2e7f3811214011ef02089d1dc54052f4659226721bf12919fcce83b04755231940a1ab2a3415cad0f6358e9996b1bfa6ae
-
SSDEEP
3072:Ofnu72N0mOgi+R2jQzGnaBbQMX88U71QhbjgTgRuEm:4XCDjiGn/MX8J7mgqQ
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-