General
-
Target
JaffaCakes118_16b9a7d8c7ca6719e4aec909b07989a0
-
Size
188KB
-
Sample
250123-nkkqnaykb1
-
MD5
16b9a7d8c7ca6719e4aec909b07989a0
-
SHA1
767579f382cf566320745a0b851410e92e4f24d9
-
SHA256
8f3f60c2fe02a4b8beda76c8dc0b9f326f2ba61ffaa0c709f1c3dbdd3a115d04
-
SHA512
0e96970886e01b8707e3f02c250197742b04636ef243ededb34341793e06f533baaba5cc79d1843143d8e6b7f311393784f82d905a9cde4af1067e4cd4c2fe4f
-
SSDEEP
3072:jffW5gwk1hNrj0ASdB0D067pMP4Sx1QspjTjqi:jftzN01dWh7pMAg79j3
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_16b9a7d8c7ca6719e4aec909b07989a0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_16b9a7d8c7ca6719e4aec909b07989a0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://13.carnovirious.net/ponyz/gate.php
http://13.JONEMNOMINIK.NET/ponyz/gate.php
http://13.LOMERDASTER.NET/ponyz/gate.php
http://13.ZABAKARVESTER.NET/ponyz/gate.php
-
payload_url
http://calanda-kaelte.ch/WtzUF.exe
http://207.56.194.195/CuVKURD.exe
Targets
-
-
Target
JaffaCakes118_16b9a7d8c7ca6719e4aec909b07989a0
-
Size
188KB
-
MD5
16b9a7d8c7ca6719e4aec909b07989a0
-
SHA1
767579f382cf566320745a0b851410e92e4f24d9
-
SHA256
8f3f60c2fe02a4b8beda76c8dc0b9f326f2ba61ffaa0c709f1c3dbdd3a115d04
-
SHA512
0e96970886e01b8707e3f02c250197742b04636ef243ededb34341793e06f533baaba5cc79d1843143d8e6b7f311393784f82d905a9cde4af1067e4cd4c2fe4f
-
SSDEEP
3072:jffW5gwk1hNrj0ASdB0D067pMP4Sx1QspjTjqi:jftzN01dWh7pMAg79j3
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-