General
-
Target
f355efce9e3c5399e35274ca90e34ec9_JaffaCakes118
-
Size
188KB
-
Sample
241215-lbqt7szmbx
-
MD5
f355efce9e3c5399e35274ca90e34ec9
-
SHA1
5e24063592fd2c065393cb9e4a5a5b0f0766cecb
-
SHA256
1d8ef96e0521575c799504b62c724ee542b1bb1d7abef81f92f4684019d53a8e
-
SHA512
9672a03ae95202e7e896028844dc8679b9c5f97d97008fc3ef1ab773ee56ec058115b9f87022a086ad58ac1e6491c5936009038d92dd1b8b0cbcd7d9e9a4455f
-
SSDEEP
3072:jg6LrCRg0lOlOkNeP3SdHfvzLlQgED1QRjjWwCLqVJ:jgnn2NC3wvzi9DGeZLq/
Static task
static1
Behavioral task
behavioral1
Sample
f355efce9e3c5399e35274ca90e34ec9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f355efce9e3c5399e35274ca90e34ec9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://13.carnovirious.net/ponyz/gate.php
http://13.JONEMNOMINIK.NET/ponyz/gate.php
http://13.LOMERDASTER.NET/ponyz/gate.php
http://13.ZABAKARVESTER.NET/ponyz/gate.php
-
payload_url
http://www.kgp-heisterbusch.de/btuckWJ.exe
http://hintonline.org/AFa.exe
http://tpcahoa.com/myYK5.exe
Targets
-
-
Target
f355efce9e3c5399e35274ca90e34ec9_JaffaCakes118
-
Size
188KB
-
MD5
f355efce9e3c5399e35274ca90e34ec9
-
SHA1
5e24063592fd2c065393cb9e4a5a5b0f0766cecb
-
SHA256
1d8ef96e0521575c799504b62c724ee542b1bb1d7abef81f92f4684019d53a8e
-
SHA512
9672a03ae95202e7e896028844dc8679b9c5f97d97008fc3ef1ab773ee56ec058115b9f87022a086ad58ac1e6491c5936009038d92dd1b8b0cbcd7d9e9a4455f
-
SSDEEP
3072:jg6LrCRg0lOlOkNeP3SdHfvzLlQgED1QRjjWwCLqVJ:jgnn2NC3wvzi9DGeZLq/
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-