General
-
Target
JaffaCakes118_60fd1fe579b1e5a97381563eed708690
-
Size
133KB
-
Sample
250101-197myazncn
-
MD5
60fd1fe579b1e5a97381563eed708690
-
SHA1
f931e39b1a6e90942005a3ef6f750ff31b61acdd
-
SHA256
4ebdc06031a6d18034a3ad73d098dd2e8d029d13bcb615d7d92c72d031e1fbe6
-
SHA512
7b190528e40e7687a17636aca05873d112eb89d25bd322482fe5a87c98c879c94755a0122b4083030d33ef90b0e7a40427c072c53b134593488941e276b1a56e
-
SSDEEP
3072:HcL0q1s2/0z0YMpxm5ZLG36Rc6aSuX2uBopgt9Jt5:IG24L8xm5ZLA626eXZBAg9D
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_60fd1fe579b1e5a97381563eed708690.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_60fd1fe579b1e5a97381563eed708690.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://mail.yaklasim.com:8080/ponyb/gate.php
http://116.122.158.195:8080/ponyb/gate.php
http://moonstire.com/ponyb/gate.php
http://natestire.com/ponyb/gate.php
-
payload_url
http://1494ccc706155932.lolipop.jp/cy3hL.exe
http://000023p.rcomhost.com/FkK.exe
http://arepix.cz/hHfcdusL.exe
http://0000bkb.rcomhost.com/gp6X.exe
Targets
-
-
Target
JaffaCakes118_60fd1fe579b1e5a97381563eed708690
-
Size
133KB
-
MD5
60fd1fe579b1e5a97381563eed708690
-
SHA1
f931e39b1a6e90942005a3ef6f750ff31b61acdd
-
SHA256
4ebdc06031a6d18034a3ad73d098dd2e8d029d13bcb615d7d92c72d031e1fbe6
-
SHA512
7b190528e40e7687a17636aca05873d112eb89d25bd322482fe5a87c98c879c94755a0122b4083030d33ef90b0e7a40427c072c53b134593488941e276b1a56e
-
SSDEEP
3072:HcL0q1s2/0z0YMpxm5ZLG36Rc6aSuX2uBopgt9Jt5:IG24L8xm5ZLA626eXZBAg9D
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-