General
-
Target
JaffaCakes118_3bc1f78487aac40899d5b5720e036a08
-
Size
219KB
-
Sample
250127-egn48szrhk
-
MD5
3bc1f78487aac40899d5b5720e036a08
-
SHA1
d2c518f782633bf97de3dcf101d7b03c00b1072e
-
SHA256
29d625b7a036c16303f2da9065a6fcea6a3f542332c64d93d8b1199d54ee1b1d
-
SHA512
14eee07a525a9a1b5da7fe2dcbf5fa8be1f897de2fd25b00ed5dd24afee85e0034517d3cb0ab3476884f2f88d5c8d46745c091a27acce88fa8fa9d44ba11b26e
-
SSDEEP
1536:kbYD8enn2pmlehJuTOgGQab8DdjYCkd1zmneSIJVW+bt9pjM5hiMvKwfEKOe8wKJ:kiLn6mGJAIqdjYCgj1hDw59vKMk7kCko
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3bc1f78487aac40899d5b5720e036a08.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3bc1f78487aac40899d5b5720e036a08.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://paralysiesfaciales.com:8080/forum/viewtopic.php
http://shop.smsmpi.com:8080/forum/viewtopic.php
http://smsmpi.com:8080/forum/viewtopic.php
http://admin.vojtekracing.hu:8080/forum/viewtopic.php
-
payload_url
http://ftp.batterymax.com.au/3EQx.exe
http://frankprater.com/9tPd.exe
http://itkstest2.com.ar/iP6ty1.exe
Targets
-
-
Target
JaffaCakes118_3bc1f78487aac40899d5b5720e036a08
-
Size
219KB
-
MD5
3bc1f78487aac40899d5b5720e036a08
-
SHA1
d2c518f782633bf97de3dcf101d7b03c00b1072e
-
SHA256
29d625b7a036c16303f2da9065a6fcea6a3f542332c64d93d8b1199d54ee1b1d
-
SHA512
14eee07a525a9a1b5da7fe2dcbf5fa8be1f897de2fd25b00ed5dd24afee85e0034517d3cb0ab3476884f2f88d5c8d46745c091a27acce88fa8fa9d44ba11b26e
-
SSDEEP
1536:kbYD8enn2pmlehJuTOgGQab8DdjYCkd1zmneSIJVW+bt9pjM5hiMvKwfEKOe8wKJ:kiLn6mGJAIqdjYCgj1hDw59vKMk7kCko
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-