General
-
Target
JaffaCakes118_676711b1025c7ef0f9cc0fd83defb6f0
-
Size
115KB
-
Sample
250102-xkb8ys1pbt
-
MD5
676711b1025c7ef0f9cc0fd83defb6f0
-
SHA1
fdf14db965b698e452bb1bf07c8448ae28d647f6
-
SHA256
eddb60bc27771a58127ab433564ff45d42e47f03d1ebce60dcb08e0646635f3e
-
SHA512
8985c025a4f251553fdb3da87729d3b3ab55731cb450301836e7411f7b2f11d2ea5a5ae28263451b95b7e069a8faa18a6a31760e06e2bba570657f9b89c3cc51
-
SSDEEP
3072:OGR6pAMei3QDFDxboP9Q/CdJlYnqtDa/H17g:OGspAwIFFW9JdPAZF
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_676711b1025c7ef0f9cc0fd83defb6f0.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_676711b1025c7ef0f9cc0fd83defb6f0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://bagpreview.com/ponys/gate.php
http://bagpreviews.com/ponys/gate.php
http://bagsare.us/ponys/gate.php
http://bagsr.me/ponys/gate.php
-
payload_url
http://proeller-shop.homepage.t-online.de/btz.exe
http://spireportal.net/MYWJg.exe
http://dapingluo.com/QfvbZyn.exe
http://weimarenterprises.com/n4t43ZqX.exe
Targets
-
-
Target
JaffaCakes118_676711b1025c7ef0f9cc0fd83defb6f0
-
Size
115KB
-
MD5
676711b1025c7ef0f9cc0fd83defb6f0
-
SHA1
fdf14db965b698e452bb1bf07c8448ae28d647f6
-
SHA256
eddb60bc27771a58127ab433564ff45d42e47f03d1ebce60dcb08e0646635f3e
-
SHA512
8985c025a4f251553fdb3da87729d3b3ab55731cb450301836e7411f7b2f11d2ea5a5ae28263451b95b7e069a8faa18a6a31760e06e2bba570657f9b89c3cc51
-
SSDEEP
3072:OGR6pAMei3QDFDxboP9Q/CdJlYnqtDa/H17g:OGspAwIFFW9JdPAZF
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-