General
-
Target
JaffaCakes118_618a5f910f6dfd87f6004b1f6bfabfe7
-
Size
120KB
-
Sample
250102-aqhatsspf1
-
MD5
618a5f910f6dfd87f6004b1f6bfabfe7
-
SHA1
fc3ee1b9de9598ebc1435d1bf5212980cf9a7e6a
-
SHA256
1f3b55013d5f0dde7271d9d2b47cd80feb1b24914906de7ca9d72b5721203337
-
SHA512
c795ff7c20b51d171f76a43489ed964284c8f009001f568ef405f10d8117c6079e6b061afca19ab1221a3e9588f3e2e52e5906c4643fece3e5d42cd52fd53a3b
-
SSDEEP
3072:+YTWmises+EvjvFcLPMLrASGDEmrY23VfS1lAweekmxd:+xhJjCcLPMLrAD/lfS1Teek8
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_618a5f910f6dfd87f6004b1f6bfabfe7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_618a5f910f6dfd87f6004b1f6bfabfe7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://korbi.va-techniker.de:8080/ponyb/gate.php
http://mail.yaklasim.com:8080/ponyb/gate.php
http://gorgeousbodysculpt.com/ponyb/gate.php
http://gorgeouswithinreach.com/ponyb/gate.php
-
payload_url
http://50.62.228.104/f62yC0T.exe
http://ftp.magnusondesign.com/iqU.exe
http://bensonfarms.com/7anYdWV.exe
http://brennstoffegehling.de/fvceAs.exe
Targets
-
-
Target
JaffaCakes118_618a5f910f6dfd87f6004b1f6bfabfe7
-
Size
120KB
-
MD5
618a5f910f6dfd87f6004b1f6bfabfe7
-
SHA1
fc3ee1b9de9598ebc1435d1bf5212980cf9a7e6a
-
SHA256
1f3b55013d5f0dde7271d9d2b47cd80feb1b24914906de7ca9d72b5721203337
-
SHA512
c795ff7c20b51d171f76a43489ed964284c8f009001f568ef405f10d8117c6079e6b061afca19ab1221a3e9588f3e2e52e5906c4643fece3e5d42cd52fd53a3b
-
SSDEEP
3072:+YTWmises+EvjvFcLPMLrASGDEmrY23VfS1lAweekmxd:+xhJjCcLPMLrAD/lfS1Teek8
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-