General
-
Target
ab60b921f601f359a5f839063db54dc9_JaffaCakes118
-
Size
188KB
-
Sample
241128-hmedrsvqak
-
MD5
ab60b921f601f359a5f839063db54dc9
-
SHA1
62b18db151e6b938804b2011ab858aab8df0d6b5
-
SHA256
66f9147f6a7390051bd2c410e9a95a333e8aaf4bfc5dec447fcf1649919a3bda
-
SHA512
0f30cfcd025cf6ec62ddc913f8dd5941779106bcdc344fcdc8ee5d9e0ddcc5a87fce17270ee454cf952ebfb86cd25271ce1c9bb2fc08a18425b99ce9cdfc55b0
-
SSDEEP
3072:1ExULsgyZtgXB9c3D09rc207q3t5kL1Qh1jCyE/5qxKmm8:1EP+Re3A9r0q3teLmsyrxKm5
Static task
static1
Behavioral task
behavioral1
Sample
ab60b921f601f359a5f839063db54dc9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ab60b921f601f359a5f839063db54dc9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://13.carnovirious.net/ponyz/gate.php
http://13.JONEMNOMINIK.NET/ponyz/gate.php
http://13.LOMERDASTER.NET/ponyz/gate.php
http://13.ZABAKARVESTER.NET/ponyz/gate.php
-
payload_url
http://gonortheast.in/Q3qKDB.exe
http://www.spec04.dircon.co.uk/UYLthYs.exe
http://www.phantommfg.com/a2YV.exe
Targets
-
-
Target
ab60b921f601f359a5f839063db54dc9_JaffaCakes118
-
Size
188KB
-
MD5
ab60b921f601f359a5f839063db54dc9
-
SHA1
62b18db151e6b938804b2011ab858aab8df0d6b5
-
SHA256
66f9147f6a7390051bd2c410e9a95a333e8aaf4bfc5dec447fcf1649919a3bda
-
SHA512
0f30cfcd025cf6ec62ddc913f8dd5941779106bcdc344fcdc8ee5d9e0ddcc5a87fce17270ee454cf952ebfb86cd25271ce1c9bb2fc08a18425b99ce9cdfc55b0
-
SSDEEP
3072:1ExULsgyZtgXB9c3D09rc207q3t5kL1Qh1jCyE/5qxKmm8:1EP+Re3A9r0q3teLmsyrxKm5
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-