General
-
Target
JaffaCakes118_0720751bfd183a19f8239485dbe82f10
-
Size
110KB
-
Sample
241231-gd8etazraw
-
MD5
0720751bfd183a19f8239485dbe82f10
-
SHA1
63788cdac64991e5386f0aefe1b6728be4db2c59
-
SHA256
124be5d975b62e7d6bd2b9bb3d0b0b81d424fe4653cadd0a06df0a9b71e31796
-
SHA512
ff9f5e45b2762f92d5f58b2766da800a29ab3e152fd35c241e3cec9a0bc1b29269b03dd76a08aac070e1d70de9d82d28b434217056101c313474d300d6d713ea
-
SSDEEP
3072:l/GU5IZYesG9WzWj322IQTYVBwGHF3Fbb:75IvsGtG46BZHFVbb
Static task
static1
Behavioral task
behavioral1
Sample
Scan_0185-pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Scan_0185-pdf.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://muzukashibrashinki.net/sli99x/gate.php
Targets
-
-
Target
Scan_0185-pdf.exe
-
Size
337KB
-
MD5
fafc3aa1d8d7a2e4500797fa720f4853
-
SHA1
bd61aa8ac1654204dc8ee3cc94cc1db734271149
-
SHA256
f50e05d249dfed303937a41961a8f616fa73542e4b07b4cc1973256ba76ad343
-
SHA512
05c724750d59c9f2423ad7b42abf1453a8c9db7bb7b0090fcd43e1aa1ccef97d96c09a15af53e8e8605fef8b5cf0edcdba1f553adc56237ca94cbd176db30a75
-
SSDEEP
3072:QLJTYbdY/AWNpCG9WnZUx4CGgGEYVBkkyZwVAnMP:JGgZUx4CTGZBttZ
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-