General
-
Target
b902d5999d8cd7b1a9bc21263f4cca06_JaffaCakes118
-
Size
188KB
-
Sample
241202-td7jqs1kes
-
MD5
b902d5999d8cd7b1a9bc21263f4cca06
-
SHA1
59a7a2cf0bcc63a9dd56338fa394d34d560beb57
-
SHA256
1ea87939091fcd074b9087e3ae3dd05821b14843ca46654df6ba3180747a502f
-
SHA512
da1ae6a69ce5dc159704a5d14959cb12aafd41da0eca802617507c5c5bcde11315f3e5d1341eaf7a77a9caf8db4e458eb08ed3e62ca5faa645ff8ad1b0c5b08f
-
SSDEEP
3072:pfx6LrCRg0lOlOkNeP3SdHfvzLlQgED1QRjjWwCLqlF:znn2NC3wvzi9DGeZLqH
Static task
static1
Behavioral task
behavioral1
Sample
b902d5999d8cd7b1a9bc21263f4cca06_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b902d5999d8cd7b1a9bc21263f4cca06_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://13.carnovirious.net/ponyz/gate.php
http://13.JONEMNOMINIK.NET/ponyz/gate.php
http://13.LOMERDASTER.NET/ponyz/gate.php
http://13.ZABAKARVESTER.NET/ponyz/gate.php
-
payload_url
http://www.kgp-heisterbusch.de/btuckWJ.exe
http://hintonline.org/AFa.exe
http://tpcahoa.com/myYK5.exe
Targets
-
-
Target
b902d5999d8cd7b1a9bc21263f4cca06_JaffaCakes118
-
Size
188KB
-
MD5
b902d5999d8cd7b1a9bc21263f4cca06
-
SHA1
59a7a2cf0bcc63a9dd56338fa394d34d560beb57
-
SHA256
1ea87939091fcd074b9087e3ae3dd05821b14843ca46654df6ba3180747a502f
-
SHA512
da1ae6a69ce5dc159704a5d14959cb12aafd41da0eca802617507c5c5bcde11315f3e5d1341eaf7a77a9caf8db4e458eb08ed3e62ca5faa645ff8ad1b0c5b08f
-
SSDEEP
3072:pfx6LrCRg0lOlOkNeP3SdHfvzLlQgED1QRjjWwCLqlF:znn2NC3wvzi9DGeZLqH
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-