General
-
Target
JaffaCakes118_48f3f67f267e33d5d0b01f392a6c1eb0
-
Size
119KB
-
Sample
250101-f8ce7awmdz
-
MD5
48f3f67f267e33d5d0b01f392a6c1eb0
-
SHA1
86b464a5755b068cbfb9c100cd91ff930a4a76d8
-
SHA256
6070e43ff25d51bde67ed4add63f757f660f371c51e0b12d6493e42dd8db49a9
-
SHA512
361fb9155dc451561d499ac65a5609dc2f304557daacfde1a2de530304a2f1d16f93e35413798a91d55919e9faa3512dcd38b422945f296e5eec7fbbf01e9983
-
SSDEEP
3072:nI8AiSLHU444NVO8umRoOS4cgzUUXdvOA51c:nIAk04xXog9IuOe
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_48f3f67f267e33d5d0b01f392a6c1eb0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_48f3f67f267e33d5d0b01f392a6c1eb0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://hotrankseo.com/ponyz/gate.php
http://loadingdockdepot.com/ponyz/gate.php
http://loadingdockgear.com/ponyz/gate.php
http://marinedockladders.com/ponyz/gate.php
-
payload_url
http://1494ccc706155932.lolipop.jp/HRKxq27U.exe
http://panachetechsolutions.com/D3N.exe
http://preventchildabuse.childrensociety.org.sg/L9i.exe
Targets
-
-
Target
JaffaCakes118_48f3f67f267e33d5d0b01f392a6c1eb0
-
Size
119KB
-
MD5
48f3f67f267e33d5d0b01f392a6c1eb0
-
SHA1
86b464a5755b068cbfb9c100cd91ff930a4a76d8
-
SHA256
6070e43ff25d51bde67ed4add63f757f660f371c51e0b12d6493e42dd8db49a9
-
SHA512
361fb9155dc451561d499ac65a5609dc2f304557daacfde1a2de530304a2f1d16f93e35413798a91d55919e9faa3512dcd38b422945f296e5eec7fbbf01e9983
-
SSDEEP
3072:nI8AiSLHU444NVO8umRoOS4cgzUUXdvOA51c:nIAk04xXog9IuOe
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-