General
-
Target
JaffaCakes118_06a5230382e309c64b581c6d43d474fb
-
Size
93KB
-
Sample
250121-w75y4swpev
-
MD5
06a5230382e309c64b581c6d43d474fb
-
SHA1
4a6ce4e129efac1ebae7045edfbb394f4e662b80
-
SHA256
57409e553883b92c1a0acfc0a5707609de81465fc32cac91b75a35bfd859dccf
-
SHA512
5fd7017702c6c3a90243ebda38103ed15c1ff813296ab189d23db5b2b3674d414d8bd9d0076a0c0da3efe3c174120330735d42e5824ab60129bf6407354460e9
-
SSDEEP
1536:ESY/8eN3BeyOdmrDOir4i/cyM9goCnPfhfLm/84MPnaaaaaaaaaaaaaaaaaaaaa1:jY/8Abdf3r4YpM9YPZzDnaaaaaaaaaaI
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_06a5230382e309c64b581c6d43d474fb.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_06a5230382e309c64b581c6d43d474fb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://honey.punked.us/popo/gate.php
-
payload_url
http://www.eurotitrisation.fr/js/andi.exe
http://www.eurotitrisation.fr/js/ppi.exe
http://www.eurotitrisation.fr/js/spy.exe
Targets
-
-
Target
JaffaCakes118_06a5230382e309c64b581c6d43d474fb
-
Size
93KB
-
MD5
06a5230382e309c64b581c6d43d474fb
-
SHA1
4a6ce4e129efac1ebae7045edfbb394f4e662b80
-
SHA256
57409e553883b92c1a0acfc0a5707609de81465fc32cac91b75a35bfd859dccf
-
SHA512
5fd7017702c6c3a90243ebda38103ed15c1ff813296ab189d23db5b2b3674d414d8bd9d0076a0c0da3efe3c174120330735d42e5824ab60129bf6407354460e9
-
SSDEEP
1536:ESY/8eN3BeyOdmrDOir4i/cyM9goCnPfhfLm/84MPnaaaaaaaaaaaaaaaaaaaaa1:jY/8Abdf3r4YpM9YPZzDnaaaaaaaaaaI
-
Pony family
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-