General
-
Target
JaffaCakes118_602d418ee7d1dafc3e56b55682e2c27b
-
Size
119KB
-
Sample
250101-xwqwgs1rbj
-
MD5
602d418ee7d1dafc3e56b55682e2c27b
-
SHA1
5623f4eb59468c7814526acc21a2f25ab62cac9f
-
SHA256
65761f49fde73675099407d0ab368c0a91662a496341351d9b6e78c08ceaeba7
-
SHA512
ae918d36231d92f4ae81fa1f92bbd6fe804692b352f60bc519e3e0639302f4e625aa927a81c08d3a764b50eac51e1230ca823c9660db113a2ad68802c337a95e
-
SSDEEP
1536:yYW4aUbqemPGIVB6dFi4gzeiQtmRUFDnnB4FDK+muIN4Vhvrc8GhOSUQDgej:yYD6tPmdczJ6nB4FKII4rZGh9gm
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_602d418ee7d1dafc3e56b55682e2c27b.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_602d418ee7d1dafc3e56b55682e2c27b.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://hubbywifeburgers.com/ponyz/gate.php
http://hubbywifecakes.com/ponyz/gate.php
http://hubbywifeco.com/ponyz/gate.php
http://hubbywifedesigns.com/ponyz/gate.php
-
payload_url
http://www.ekko-snakker.de/mR4ipb.exe
http://voipphoneconsulting.com/85h9mEQ.exe
http://thirdangelmessage.com/WXBcdng.exe
Targets
-
-
Target
JaffaCakes118_602d418ee7d1dafc3e56b55682e2c27b
-
Size
119KB
-
MD5
602d418ee7d1dafc3e56b55682e2c27b
-
SHA1
5623f4eb59468c7814526acc21a2f25ab62cac9f
-
SHA256
65761f49fde73675099407d0ab368c0a91662a496341351d9b6e78c08ceaeba7
-
SHA512
ae918d36231d92f4ae81fa1f92bbd6fe804692b352f60bc519e3e0639302f4e625aa927a81c08d3a764b50eac51e1230ca823c9660db113a2ad68802c337a95e
-
SSDEEP
1536:yYW4aUbqemPGIVB6dFi4gzeiQtmRUFDnnB4FDK+muIN4Vhvrc8GhOSUQDgej:yYD6tPmdczJ6nB4FKII4rZGh9gm
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-