General
-
Target
JaffaCakes118_0e60b185f08ff0e9928354b3cb7acde8
-
Size
143KB
-
Sample
250122-rgel1szlfw
-
MD5
0e60b185f08ff0e9928354b3cb7acde8
-
SHA1
ebaf440093b6cb3e4695dddfec8d96a753f1e194
-
SHA256
8e98754cf68bd5f26d084a8fa18abd1bab87f47a7efc12554ee830283944a815
-
SHA512
bde48674743126677b15532c05fea1830364360d3a178ea2aa7333690254081379756c8bbd67449a5519b63306dc74af4b1f488b1cc42b1c076c43780109b050
-
SSDEEP
3072:XjlKZelTDQcnUt7Z9+/Sggr9oob5/cupWApaJGtOg:JwelzUtN9+qNDbGqactZ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0e60b185f08ff0e9928354b3cb7acde8.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0e60b185f08ff0e9928354b3cb7acde8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://66.55.89.150:8080/ponys/gate.php
http://66.55.89.151:8080/ponys/gate.php
-
payload_url
http://bde-essec.com/1ePZ.exe
http://wilde.webprojekt.ch/uyNcp.exe
http://www.ronale.com/rFsckgVS.exe
http://207.57.248.58/1VyR6.exe
Targets
-
-
Target
JaffaCakes118_0e60b185f08ff0e9928354b3cb7acde8
-
Size
143KB
-
MD5
0e60b185f08ff0e9928354b3cb7acde8
-
SHA1
ebaf440093b6cb3e4695dddfec8d96a753f1e194
-
SHA256
8e98754cf68bd5f26d084a8fa18abd1bab87f47a7efc12554ee830283944a815
-
SHA512
bde48674743126677b15532c05fea1830364360d3a178ea2aa7333690254081379756c8bbd67449a5519b63306dc74af4b1f488b1cc42b1c076c43780109b050
-
SSDEEP
3072:XjlKZelTDQcnUt7Z9+/Sggr9oob5/cupWApaJGtOg:JwelzUtN9+qNDbGqactZ
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-