General
-
Target
JaffaCakes118_6dc861a9383cc8c63739e80507825694
-
Size
127KB
-
Sample
250103-tfypls1rfy
-
MD5
6dc861a9383cc8c63739e80507825694
-
SHA1
6092c31fb43493b9b9e1a5a61dc41f382a5e5a0f
-
SHA256
17eaea0b3ef942b6ed921937c6ff84a31a5c3bd3332cb00e13cfea2e49d6bae4
-
SHA512
65aa75f0892cd710b7cdb2c7119dc1b3d19c26bda6f04bf60b077f43fea031f86cf471d971c3f0f5569fc2a04aa4882d777ab05011d86ec6a919df6c17c87574
-
SSDEEP
1536:Svxs04Y0wLJswSj0a1EvF+6yvZBc1nRUdMljeUdGH7ZspFMyEoQkCU9vp2OqKG:SvuWLJswSYag0DcVhdOoFS/
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6dc861a9383cc8c63739e80507825694.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6dc861a9383cc8c63739e80507825694.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://mail.yaklasim.com:8080/forum/viewtopic.php
http://190.81.149.106:8080/forum/viewtopic.php
http://laserlipoplasticsurgeon.com/forum/viewtopic.php
http://laserlipoplasticsurgeons.com/forum/viewtopic.php
-
payload_url
http://agapidis.gr/2L1a.exe
http://oyml.c3int.net/vaMxF.exe
http://ftp.cgetc.com/zKFsRGYG.exe
Targets
-
-
Target
JaffaCakes118_6dc861a9383cc8c63739e80507825694
-
Size
127KB
-
MD5
6dc861a9383cc8c63739e80507825694
-
SHA1
6092c31fb43493b9b9e1a5a61dc41f382a5e5a0f
-
SHA256
17eaea0b3ef942b6ed921937c6ff84a31a5c3bd3332cb00e13cfea2e49d6bae4
-
SHA512
65aa75f0892cd710b7cdb2c7119dc1b3d19c26bda6f04bf60b077f43fea031f86cf471d971c3f0f5569fc2a04aa4882d777ab05011d86ec6a919df6c17c87574
-
SSDEEP
1536:Svxs04Y0wLJswSj0a1EvF+6yvZBc1nRUdMljeUdGH7ZspFMyEoQkCU9vp2OqKG:SvuWLJswSYag0DcVhdOoFS/
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-