General
-
Target
ea3fee01dde15d88f8a7c49cc399e473_JaffaCakes118
-
Size
140KB
-
Sample
241213-gvd8asskfr
-
MD5
ea3fee01dde15d88f8a7c49cc399e473
-
SHA1
2f8b2749b2bb8a4bb96e78a8143191a7d7ccdd12
-
SHA256
c446071a4db7853525de9351e092e3c1ae58007a1a85355dea170606b55b042f
-
SHA512
c542f6746a551d5b7a10efcd3e595d0a0c619f0681a0a27119b89c7e618de56c6c6f8a13202b788bd10e36d86ed543539b64c8e55b3452286c916429dc1fd050
-
SSDEEP
3072:grD9jaF5bKXEIK5KGRwGAG6TQWrPppppZppppppppppQppppppppZppppppppppH:J5bNIJGRTAnTQMPppppZppppppppppQh
Static task
static1
Behavioral task
behavioral1
Sample
ea3fee01dde15d88f8a7c49cc399e473_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea3fee01dde15d88f8a7c49cc399e473_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://8.axellelemaire.org/forum/viewtopic.php
http://8.cafesexcelentes.com/forum/viewtopic.php
-
payload_url
http://Voyagersystems.cc/EcYdbYWf.exe
http://marketer-school.net/xFMTvTNP.exe
Targets
-
-
Target
ea3fee01dde15d88f8a7c49cc399e473_JaffaCakes118
-
Size
140KB
-
MD5
ea3fee01dde15d88f8a7c49cc399e473
-
SHA1
2f8b2749b2bb8a4bb96e78a8143191a7d7ccdd12
-
SHA256
c446071a4db7853525de9351e092e3c1ae58007a1a85355dea170606b55b042f
-
SHA512
c542f6746a551d5b7a10efcd3e595d0a0c619f0681a0a27119b89c7e618de56c6c6f8a13202b788bd10e36d86ed543539b64c8e55b3452286c916429dc1fd050
-
SSDEEP
3072:grD9jaF5bKXEIK5KGRwGAG6TQWrPppppZppppppppppQppppppppZppppppppppH:J5bNIJGRTAnTQMPppppZppppppppppQh
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-