General
-
Target
JaffaCakes118_6ba5ad060e49e0d75fc9c5493c964cf0
-
Size
118KB
-
Sample
250103-lc6l2sxjd1
-
MD5
6ba5ad060e49e0d75fc9c5493c964cf0
-
SHA1
638de6b97090408afd39f9b9ccb6d70b106bdc05
-
SHA256
0321f09e28d345740a1aa0d00c04d1e965587d3a4cf4c1456f3e5936b726aaf9
-
SHA512
84fb4ca971addde6ea4d919a5b42d323bf6c03ffa23db3d9bfaf9ffcecdb41d14ffe43c6a14ef9d36b4b2a91a1e6069e630ea06553d7d78ce18a82ebc92403b0
-
SSDEEP
3072:f90YJaM6JsbS+btnHayuL45mtrfwdHmleUkfWE2NG4T:kR+xHayUimSdHmQF+Zs4T
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6ba5ad060e49e0d75fc9c5493c964cf0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6ba5ad060e49e0d75fc9c5493c964cf0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://rivercrossingaptstx.com/ponyb/gate.php
http://rivercrossingaptstx.info/ponyb/gate.php
http://y2k-usa.com/ponyb/gate.php
http://fiberopticcableguy.com/ponyb/gate.php
-
payload_url
http://ebaa.daa.jp/A8HFWqy.exe
http://www.ekko-snakker.de/n9m.exe
http://plugwise.gr/VN15ik02.exe
http://fanpageserver.info/PhFJ.exe
Targets
-
-
Target
JaffaCakes118_6ba5ad060e49e0d75fc9c5493c964cf0
-
Size
118KB
-
MD5
6ba5ad060e49e0d75fc9c5493c964cf0
-
SHA1
638de6b97090408afd39f9b9ccb6d70b106bdc05
-
SHA256
0321f09e28d345740a1aa0d00c04d1e965587d3a4cf4c1456f3e5936b726aaf9
-
SHA512
84fb4ca971addde6ea4d919a5b42d323bf6c03ffa23db3d9bfaf9ffcecdb41d14ffe43c6a14ef9d36b4b2a91a1e6069e630ea06553d7d78ce18a82ebc92403b0
-
SSDEEP
3072:f90YJaM6JsbS+btnHayuL45mtrfwdHmleUkfWE2NG4T:kR+xHayUimSdHmQF+Zs4T
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-