General
-
Target
JaffaCakes118_1d5dc399055f771290dc9b7c630042a0
-
Size
160KB
-
Sample
250124-dlhmkswpgy
-
MD5
1d5dc399055f771290dc9b7c630042a0
-
SHA1
65fb980fe50d477cdefac14704800cfaf08aa789
-
SHA256
38b68a9e074c519ea38199a824efe32745c3c27bc2cedfe4bd7b5dd654838526
-
SHA512
1c5d571c5ce68e1ce587b1475cb6adb0dd2c2f68a4b9051d96424670f704af9f8cdcdafa43f03e6458e2e711462e203ef66a7004f84b99ceb41cd8d3e5dd7db0
-
SSDEEP
3072:iVouj2qgu7klbJBJ5ByuC/xUBf1OXZa6rOX5kMPOxylt:iVRj2hLlTJDr6pTr
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1d5dc399055f771290dc9b7c630042a0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1d5dc399055f771290dc9b7c630042a0.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://weshift.net:8080/forum/viewtopic.php
http://207.58.180.139:8080/forum/viewtopic.php
http://aoc.fm:8080/forum/viewtopic.php
http://changepioneers.at:8080/forum/viewtopic.php
-
payload_url
http://searchplus.ca/uwPWQ.exe
http://www.torinoacquari.com/tLy6ewd.exe
http://test.activeim.com.au/WBv.exe
Targets
-
-
Target
JaffaCakes118_1d5dc399055f771290dc9b7c630042a0
-
Size
160KB
-
MD5
1d5dc399055f771290dc9b7c630042a0
-
SHA1
65fb980fe50d477cdefac14704800cfaf08aa789
-
SHA256
38b68a9e074c519ea38199a824efe32745c3c27bc2cedfe4bd7b5dd654838526
-
SHA512
1c5d571c5ce68e1ce587b1475cb6adb0dd2c2f68a4b9051d96424670f704af9f8cdcdafa43f03e6458e2e711462e203ef66a7004f84b99ceb41cd8d3e5dd7db0
-
SSDEEP
3072:iVouj2qgu7klbJBJ5ByuC/xUBf1OXZa6rOX5kMPOxylt:iVRj2hLlTJDr6pTr
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-