General
-
Target
JaffaCakes118_67ea8e01c8f9c8e1a5879ad0c6ef23b0
-
Size
124KB
-
Sample
250102-yptjgatndy
-
MD5
67ea8e01c8f9c8e1a5879ad0c6ef23b0
-
SHA1
64019c875f479b281e7192c88a4a9bed8ff8bdd8
-
SHA256
6ecf94c759c4ed0c6af65ddfb31166c87ff6bffc95469bc3284d88801af5eb9f
-
SHA512
c36f35d757bf319ebb12b234a0be3b73bebc42b394dcbb679088fbdaca4de2f55c8f52296b4be5405f67f5e0677432f2530b967c7cf375bd6f3c9f90d2ae13c9
-
SSDEEP
3072:kdKWs4ceV24xJluB092IuHtX5J52gHfQqB6kH:2jFV9U0oI8GgpckH
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_67ea8e01c8f9c8e1a5879ad0c6ef23b0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_67ea8e01c8f9c8e1a5879ad0c6ef23b0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://korbi.va-techniker.de:8080/ponyz/gate.php
http://mail.yaklasim.com:8080/ponyz/gate.php
http://phdsurvey.org/ponyz/gate.php
http://phdstudy.org/ponyz/gate.php
-
payload_url
http://hiltonheadrealestatemlstoday.com/aS8.exe
http://lozanoadjusters.com/gte2RiY.exe
http://palpart.com/ZfjyoG5.exe
Targets
-
-
Target
JaffaCakes118_67ea8e01c8f9c8e1a5879ad0c6ef23b0
-
Size
124KB
-
MD5
67ea8e01c8f9c8e1a5879ad0c6ef23b0
-
SHA1
64019c875f479b281e7192c88a4a9bed8ff8bdd8
-
SHA256
6ecf94c759c4ed0c6af65ddfb31166c87ff6bffc95469bc3284d88801af5eb9f
-
SHA512
c36f35d757bf319ebb12b234a0be3b73bebc42b394dcbb679088fbdaca4de2f55c8f52296b4be5405f67f5e0677432f2530b967c7cf375bd6f3c9f90d2ae13c9
-
SSDEEP
3072:kdKWs4ceV24xJluB092IuHtX5J52gHfQqB6kH:2jFV9U0oI8GgpckH
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-