General
-
Target
e117c49655c3fc5d64d6a1b4922ecd74_JaffaCakes118
-
Size
188KB
-
Sample
241211-mtb97stnap
-
MD5
e117c49655c3fc5d64d6a1b4922ecd74
-
SHA1
7c967a9390d854fa5fc01171b3611139129afca4
-
SHA256
f8bad94e96e2fd30406252dc15a958f64b6f5e2a8abc2b3efe428f02ae1a2bd3
-
SHA512
8b4f9c035019c6eae6d588b313266422129aad2908b5465b669d14ec208f9c6a1e69c3b87647d72dc4284c1d1246a6cba734aea2d440fb74bd5c768393b8aca5
-
SSDEEP
3072:ifBxULsgyZtgXB9c3D09rc207q3t5kL1Qh1jCyE/5qxKmyq:uP+Re3A9r0q3teLmsyrxKmr
Static task
static1
Behavioral task
behavioral1
Sample
e117c49655c3fc5d64d6a1b4922ecd74_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e117c49655c3fc5d64d6a1b4922ecd74_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://13.carnovirious.net/ponyz/gate.php
http://13.JONEMNOMINIK.NET/ponyz/gate.php
http://13.LOMERDASTER.NET/ponyz/gate.php
http://13.ZABAKARVESTER.NET/ponyz/gate.php
-
payload_url
http://gonortheast.in/Q3qKDB.exe
http://www.spec04.dircon.co.uk/UYLthYs.exe
http://www.phantommfg.com/a2YV.exe
Targets
-
-
Target
e117c49655c3fc5d64d6a1b4922ecd74_JaffaCakes118
-
Size
188KB
-
MD5
e117c49655c3fc5d64d6a1b4922ecd74
-
SHA1
7c967a9390d854fa5fc01171b3611139129afca4
-
SHA256
f8bad94e96e2fd30406252dc15a958f64b6f5e2a8abc2b3efe428f02ae1a2bd3
-
SHA512
8b4f9c035019c6eae6d588b313266422129aad2908b5465b669d14ec208f9c6a1e69c3b87647d72dc4284c1d1246a6cba734aea2d440fb74bd5c768393b8aca5
-
SSDEEP
3072:ifBxULsgyZtgXB9c3D09rc207q3t5kL1Qh1jCyE/5qxKmyq:uP+Re3A9r0q3teLmsyrxKmr
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-