General
-
Target
JaffaCakes118_7b93c55b1af0c62ab7ee3370c69ec920
-
Size
542KB
-
Sample
250104-y4634svrgt
-
MD5
7b93c55b1af0c62ab7ee3370c69ec920
-
SHA1
aca3ddc65855cec5c61e6a2ec72e6388817d17b6
-
SHA256
53d38d5ebef7db0fd36023453d028419b7ee03f6896e793a8228b20d5da5a2ef
-
SHA512
315e6e87d2c125a26f86c5c72847492905056cbebe4cfb22f94a3c1e498fc47aa78dce759efb73cf1381d7eac21ddb9d6dcc98131842cb16f1d7a6e27e29cccd
-
SSDEEP
3072:Y3FPo4wMMv7A8/HaVuYeHHvWM/EOh7xWN9T7xWN9hqabvHlnfnbn0XpCbMIgjGwB:Y3Vo4udnHHvv8OC4b8vJSaK/e+Fj8RX
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7b93c55b1af0c62ab7ee3370c69ec920.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7b93c55b1af0c62ab7ee3370c69ec920.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://bsluae.co/anak/Panel/gate.php
http://www.bsluae.co/anak/Panel/gate.php
Targets
-
-
Target
JaffaCakes118_7b93c55b1af0c62ab7ee3370c69ec920
-
Size
542KB
-
MD5
7b93c55b1af0c62ab7ee3370c69ec920
-
SHA1
aca3ddc65855cec5c61e6a2ec72e6388817d17b6
-
SHA256
53d38d5ebef7db0fd36023453d028419b7ee03f6896e793a8228b20d5da5a2ef
-
SHA512
315e6e87d2c125a26f86c5c72847492905056cbebe4cfb22f94a3c1e498fc47aa78dce759efb73cf1381d7eac21ddb9d6dcc98131842cb16f1d7a6e27e29cccd
-
SSDEEP
3072:Y3FPo4wMMv7A8/HaVuYeHHvWM/EOh7xWN9T7xWN9hqabvHlnfnbn0XpCbMIgjGwB:Y3Vo4udnHHvv8OC4b8vJSaK/e+Fj8RX
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-