General
-
Target
f61106c54653ed36c33684d3c7a90f70_JaffaCakes118
-
Size
152KB
-
Sample
241215-2ly7bssmdn
-
MD5
f61106c54653ed36c33684d3c7a90f70
-
SHA1
847d98d20fda6542b6000a0d44abf05163582809
-
SHA256
242cb3fe3053ec87f7b3bac94748a55892ab6d5ada72fdc88d0d8dc636319905
-
SHA512
7602783c22cbda6d185bcb5060ae15b550ee2d7d89dd31f966975df0ca1d4b402b418bef7feac90566dac51a865a406ea84b1635c439a2969d64917d40b38ea1
-
SSDEEP
1536:JkSMbnMatTdVsPjzfSzoO0YIYzdK+vbnsq30mGzNfL881gh5xBwJad6++Fa37o:bMb3dVsP3WNdXDsq3vMpXgQwI+qa37
Static task
static1
Behavioral task
behavioral1
Sample
f61106c54653ed36c33684d3c7a90f70_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f61106c54653ed36c33684d3c7a90f70_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://beta.moto-profil.pl/lnyuygf.php
http://profiauto.pl/limyxda.php
http://heros.wis.pl/rotuybd.php
http://jkgroup.pl/vwlwutk.php
http://nokturn.katowice.pl/abmptjt.php
http://przychodniarodzina.pl/ulyplxl.php
http://beta.szj.info.pl/tqslmfc.php
-
payload_url
http://dpskamilzabrze.pl/tmp/sm.exe
http://dpskamilzabrze.pl/tmp/np.exe
Targets
-
-
Target
f61106c54653ed36c33684d3c7a90f70_JaffaCakes118
-
Size
152KB
-
MD5
f61106c54653ed36c33684d3c7a90f70
-
SHA1
847d98d20fda6542b6000a0d44abf05163582809
-
SHA256
242cb3fe3053ec87f7b3bac94748a55892ab6d5ada72fdc88d0d8dc636319905
-
SHA512
7602783c22cbda6d185bcb5060ae15b550ee2d7d89dd31f966975df0ca1d4b402b418bef7feac90566dac51a865a406ea84b1635c439a2969d64917d40b38ea1
-
SSDEEP
1536:JkSMbnMatTdVsPjzfSzoO0YIYzdK+vbnsq30mGzNfL881gh5xBwJad6++Fa37o:bMb3dVsP3WNdXDsq3vMpXgQwI+qa37
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-