General
-
Target
ad4567669aabf13bf382d25e9764c020_JaffaCakes118
-
Size
188KB
-
Sample
241128-xlpknsskcl
-
MD5
ad4567669aabf13bf382d25e9764c020
-
SHA1
e1286a59fead29067ada68b7b77df3e439e2ad08
-
SHA256
d8a60e92fd2537633ec2d94994f46d78f9c97bdc834f322af111dd88c7511190
-
SHA512
ce70fdb7f1430130389e89ad260d7f8382caab10884ab245b0d0f5e34836c9ffa63dac9bdc449c8c0831d290f2d088ed8170548058227b560c3554f256969b26
-
SSDEEP
3072:ptIxYYah80Oos1+Y0Vzt5KllUyk1QRjjBCdB1fqV9:pt8R1R01KllvkGM1fqD
Static task
static1
Behavioral task
behavioral1
Sample
ad4567669aabf13bf382d25e9764c020_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ad4567669aabf13bf382d25e9764c020_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://13.carnovirious.net/ponyz/gate.php
http://13.JONEMNOMINIK.NET/ponyz/gate.php
http://13.LOMERDASTER.NET/ponyz/gate.php
http://13.ZABAKARVESTER.NET/ponyz/gate.php
-
payload_url
http://gonortheast.in/Q3qKDB.exe
http://tdmwater.com/pTBr5nj.exe
http://www.phantommfg.com/a2YV.exe
Targets
-
-
Target
ad4567669aabf13bf382d25e9764c020_JaffaCakes118
-
Size
188KB
-
MD5
ad4567669aabf13bf382d25e9764c020
-
SHA1
e1286a59fead29067ada68b7b77df3e439e2ad08
-
SHA256
d8a60e92fd2537633ec2d94994f46d78f9c97bdc834f322af111dd88c7511190
-
SHA512
ce70fdb7f1430130389e89ad260d7f8382caab10884ab245b0d0f5e34836c9ffa63dac9bdc449c8c0831d290f2d088ed8170548058227b560c3554f256969b26
-
SSDEEP
3072:ptIxYYah80Oos1+Y0Vzt5KllUyk1QRjjBCdB1fqV9:pt8R1R01KllvkGM1fqD
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-