General
-
Target
c40a3b890b56f2af775b2e49a8c06d34_JaffaCakes118
-
Size
141KB
-
Sample
241204-x5l9naspgr
-
MD5
c40a3b890b56f2af775b2e49a8c06d34
-
SHA1
b9c01e3b12b0a1a24c14f1ec98f561443f60dfe7
-
SHA256
a78b27e1e7bad8d7080ac816f6984f03e78d53041077aa24133a570e7c1ae1ef
-
SHA512
09d803ff28bfd3d343002cfa7e3922443ae9464ac95e08334033b0469706fb73fd48bc3d6562ba1a00c246a18a3b346cb869c1ddbe94022b275e1ccf4a5ea221
-
SSDEEP
3072:ePAAwpl6vFfKQYiYOaRSRBMENVPQO08OfztCFs4ndXHiFkRcOYnlZW:ePAAelEFfRJGm34O08ews4d
Static task
static1
Behavioral task
behavioral1
Sample
c40a3b890b56f2af775b2e49a8c06d34_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c40a3b890b56f2af775b2e49a8c06d34_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://bigfishllc.com:81/forum/viewtopic.php
http://3ecompany.com:8080/forum/viewtopic.php
http://23.mylocalreports.net/forum/viewtopic.php
http://23.mylocalreports.org/forum/viewtopic.php
-
payload_url
http://b2clean.com/HxtTA.exe
http://tonercombo.com/k1dr2K.exe
http://trcg.ca/wpUoYEY.exe
Targets
-
-
Target
c40a3b890b56f2af775b2e49a8c06d34_JaffaCakes118
-
Size
141KB
-
MD5
c40a3b890b56f2af775b2e49a8c06d34
-
SHA1
b9c01e3b12b0a1a24c14f1ec98f561443f60dfe7
-
SHA256
a78b27e1e7bad8d7080ac816f6984f03e78d53041077aa24133a570e7c1ae1ef
-
SHA512
09d803ff28bfd3d343002cfa7e3922443ae9464ac95e08334033b0469706fb73fd48bc3d6562ba1a00c246a18a3b346cb869c1ddbe94022b275e1ccf4a5ea221
-
SSDEEP
3072:ePAAwpl6vFfKQYiYOaRSRBMENVPQO08OfztCFs4ndXHiFkRcOYnlZW:ePAAelEFfRJGm34O08ews4d
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-