General
-
Target
JaffaCakes118_6da606be1f273600a4c8cf8bb3f5f4c0
-
Size
123KB
-
Sample
250103-szekea1kbx
-
MD5
6da606be1f273600a4c8cf8bb3f5f4c0
-
SHA1
ef3769ff2a5f0dbcc3eeeb3792d9beea50357b22
-
SHA256
aff63d66b9d1ff5a48db02545466a3ecc412ae2de676a712cea6d8bc3b4f2f30
-
SHA512
ea097fe94f6995eef28f2924c30c915de4d4280fa272153175159753037f5837aeaa2a393a510ad21fe24d5df7fb76338c7cf9cff42ac1429600ea7106f92a82
-
SSDEEP
1536:pcvgl0yPwg3YC7t0XxZhl3bB326nOpSj/a71+a0dILH6uGdbIIp6d9bka+nMW1jl:agCyN3ZeLhh1nOpS2Ua0eauGmxdJOXh
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6da606be1f273600a4c8cf8bb3f5f4c0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6da606be1f273600a4c8cf8bb3f5f4c0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://94.32.66.114/forum/viewtopic.php
http://116.122.158.195:8080/forum/viewtopic.php
http://drpeterson.org/forum/viewtopic.php
http://e21c.com/forum/viewtopic.php
-
payload_url
http://iuysw.com/RTLGoH.exe
http://64.64.26.158/P5YYAEQ.exe
http://brennstoffegehling.de/mv3EYAbG.exe
Targets
-
-
Target
JaffaCakes118_6da606be1f273600a4c8cf8bb3f5f4c0
-
Size
123KB
-
MD5
6da606be1f273600a4c8cf8bb3f5f4c0
-
SHA1
ef3769ff2a5f0dbcc3eeeb3792d9beea50357b22
-
SHA256
aff63d66b9d1ff5a48db02545466a3ecc412ae2de676a712cea6d8bc3b4f2f30
-
SHA512
ea097fe94f6995eef28f2924c30c915de4d4280fa272153175159753037f5837aeaa2a393a510ad21fe24d5df7fb76338c7cf9cff42ac1429600ea7106f92a82
-
SSDEEP
1536:pcvgl0yPwg3YC7t0XxZhl3bB326nOpSj/a71+a0dILH6uGdbIIp6d9bka+nMW1jl:agCyN3ZeLhh1nOpS2Ua0eauGmxdJOXh
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-