General
-
Target
JaffaCakes118_664cbc760333531256b4f79bacfc7db9
-
Size
113KB
-
Sample
250102-te1sksxmdv
-
MD5
664cbc760333531256b4f79bacfc7db9
-
SHA1
889657243e3f8103a204d850463b6d290b7b6ea8
-
SHA256
ff85608c13d9e7bffbb952324bd50c2368e27e0de1a3a91b5b5d254ee6e9db63
-
SHA512
7ebdf8eebea75f54565d8dd5c5b7d4b973327dc38d1ac85e4df897634ebfa56d44a67a58944c6857b36699e6388e944ed1beb03c4634d061899b6054008ea936
-
SSDEEP
1536:/M+kcLSdWMrickAjiHlX8UszBPS2EpM1ztS6tBkZ7CIXmALtJQlWb6qoiPMEpStm:UjKCWNckAjmyX+ZeIXjfQG6qPPf
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_664cbc760333531256b4f79bacfc7db9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_664cbc760333531256b4f79bacfc7db9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://fillmaka.com/forum/viewtopic.php
http://fillmmaka.com/forum/viewtopic.php
http://filmaka.biz/forum/viewtopic.php
http://filmaka.co.uk/forum/viewtopic.php
-
payload_url
http://204.12.101.9/GDN.exe
http://support.paladin-ent.com/pU7Ze.exe
http://servernas.com.au/TzHGU.exe
http://yoursiteonline.us/qyvV4Li.exe
Targets
-
-
Target
JaffaCakes118_664cbc760333531256b4f79bacfc7db9
-
Size
113KB
-
MD5
664cbc760333531256b4f79bacfc7db9
-
SHA1
889657243e3f8103a204d850463b6d290b7b6ea8
-
SHA256
ff85608c13d9e7bffbb952324bd50c2368e27e0de1a3a91b5b5d254ee6e9db63
-
SHA512
7ebdf8eebea75f54565d8dd5c5b7d4b973327dc38d1ac85e4df897634ebfa56d44a67a58944c6857b36699e6388e944ed1beb03c4634d061899b6054008ea936
-
SSDEEP
1536:/M+kcLSdWMrickAjiHlX8UszBPS2EpM1ztS6tBkZ7CIXmALtJQlWb6qoiPMEpStm:UjKCWNckAjmyX+ZeIXjfQG6qPPf
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-