General
-
Target
b0ca9fb1995c06070d91b3b2762d3e55_JaffaCakes118
-
Size
188KB
-
Sample
241129-m2hryswpfn
-
MD5
b0ca9fb1995c06070d91b3b2762d3e55
-
SHA1
3d595255eb72425833e3c257945d6f9b001d865e
-
SHA256
7f1e32ece880f8bb05106edb730a93737ab9e3f041728ab28cb5291e9a1c0ff6
-
SHA512
191f93f74d37510608033e48e7d142e68bdd18cec84605111a59ed91aea41b34f9f63e6ca14f4002e33774600eeb4e9bd33008b8bea924113c5b1f508b8eca04
-
SSDEEP
3072:Gzqu72N0mOgi+R2jQzGnaBbQMX88U71QhbjgTgRuEN:1XCDjiGn/MX8J7mgqP
Static task
static1
Behavioral task
behavioral1
Sample
b0ca9fb1995c06070d91b3b2762d3e55_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b0ca9fb1995c06070d91b3b2762d3e55_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://13.carnovirious.net/ponyz/gate.php
http://13.JONEMNOMINIK.NET/ponyz/gate.php
http://13.LOMERDASTER.NET/ponyz/gate.php
http://13.ZABAKARVESTER.NET/ponyz/gate.php
-
payload_url
http://ruff-it-systeme.de/6yKd7t.exe
http://calanda-kaelte.ch/WtzUF.exe
http://207.56.194.195/CuVKURD.exe
Targets
-
-
Target
b0ca9fb1995c06070d91b3b2762d3e55_JaffaCakes118
-
Size
188KB
-
MD5
b0ca9fb1995c06070d91b3b2762d3e55
-
SHA1
3d595255eb72425833e3c257945d6f9b001d865e
-
SHA256
7f1e32ece880f8bb05106edb730a93737ab9e3f041728ab28cb5291e9a1c0ff6
-
SHA512
191f93f74d37510608033e48e7d142e68bdd18cec84605111a59ed91aea41b34f9f63e6ca14f4002e33774600eeb4e9bd33008b8bea924113c5b1f508b8eca04
-
SSDEEP
3072:Gzqu72N0mOgi+R2jQzGnaBbQMX88U71QhbjgTgRuEN:1XCDjiGn/MX8J7mgqP
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-