General
-
Target
cf4d9e16f5aaa9addb36f82c6e633407_JaffaCakes118
-
Size
141KB
-
Sample
241206-17qawazrfw
-
MD5
cf4d9e16f5aaa9addb36f82c6e633407
-
SHA1
e81ba955d2ddeefe3cc2e96cf50834e54d9dbcac
-
SHA256
4227f61fc11bfde7bc69936842279d6a7f4d2e69a3216acb1d117f70d7f2c533
-
SHA512
61c2a2fb1a184493aa92871ce87e073ea961c4854b47ee3880bec6adc910497d4197d716607d099fd22420b4214440f2f0a01745b328c3df2e52d7ff7343e7f2
-
SSDEEP
3072:qWC5FkD6ogRgta2TClhTjRXokHstq3hgVu10IXHiFkRcOYnlZW:q4eFRgta3l/MHH2
Static task
static1
Behavioral task
behavioral1
Sample
cf4d9e16f5aaa9addb36f82c6e633407_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
cf4d9e16f5aaa9addb36f82c6e633407_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://bigfishllc.com:81/forum/viewtopic.php
http://3ecompany.com:8080/forum/viewtopic.php
http://21.harnessingsystems.com/forum/viewtopic.php
http://21.multiplexvehiclesystems.com/forum/viewtopic.php
-
payload_url
http://b2clean.com/HxtTA.exe
http://tonercombo.com/k1dr2K.exe
http://trcg.ca/wpUoYEY.exe
Targets
-
-
Target
cf4d9e16f5aaa9addb36f82c6e633407_JaffaCakes118
-
Size
141KB
-
MD5
cf4d9e16f5aaa9addb36f82c6e633407
-
SHA1
e81ba955d2ddeefe3cc2e96cf50834e54d9dbcac
-
SHA256
4227f61fc11bfde7bc69936842279d6a7f4d2e69a3216acb1d117f70d7f2c533
-
SHA512
61c2a2fb1a184493aa92871ce87e073ea961c4854b47ee3880bec6adc910497d4197d716607d099fd22420b4214440f2f0a01745b328c3df2e52d7ff7343e7f2
-
SSDEEP
3072:qWC5FkD6ogRgta2TClhTjRXokHstq3hgVu10IXHiFkRcOYnlZW:q4eFRgta3l/MHH2
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-