General
-
Target
JaffaCakes118_3ce6d75e9efaaa6bfec0cbfc3c13221d
-
Size
170KB
-
Sample
250127-hflt9swkhy
-
MD5
3ce6d75e9efaaa6bfec0cbfc3c13221d
-
SHA1
64e8d0a205ae12fac09aa3886d04e2c2596a560b
-
SHA256
6c947eb8f1a6c1c1a0faaab9eaa083097b98801ea43d319ee3368e3b6ca10896
-
SHA512
ab4dbf32b4eec30f842cc4f8cb845b9058428d2406315139b1239a00d6495217f5e55910aef08037557756c0ac74648383f9f35347ba93694907fcad2a6c57f9
-
SSDEEP
3072:IslkrbznLClVExWC8KLluOwoLlE2Je2giJ3UsxEo/StYNr8JUXPhxMLKiKHGtD79:rkLnXxgKweBJQsuoUU/hxMGiOgKU
Static task
static1
Behavioral task
behavioral1
Sample
Ecard.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Ecard.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://mx9.inboxgateway.com/Uploads/353/Panel/gate.php
Targets
-
-
Target
Ecard.exe
-
Size
241KB
-
MD5
7e8ea0313d709af979371f4181e183c7
-
SHA1
c34fa5d05d805dbb0db6625ab2a9ad0c5e3a3fea
-
SHA256
dcfa763016f07b439755539138f7bdc187d21272ba2ce7d7f18f34f23e10a8f5
-
SHA512
92cb728473f30f3083a68ec8a0c49763481a045f8af3ba6977b172c40497b3811a4390aa0d0a230a7c4ab2cb00229f201606937f7f4846b42df686fc0d64119c
-
SSDEEP
3072:SoRSFAdV76EVe5qK79HFg1C8KLluOwoLlE2te2giJ3UKxEo/StYNr8JUXZsxMxM:60LVe5fYVKweBtQKuoUUrxMrYo
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-