General
-
Target
JaffaCakes118_414cb717a4cd9fc4b0e2b31638ecc274
-
Size
133KB
-
Sample
250127-tgmczaxjdm
-
MD5
414cb717a4cd9fc4b0e2b31638ecc274
-
SHA1
641a95f3b20e3ce2e1e201af1517a4b18b4d3f8a
-
SHA256
02a49c7d74b80caf9cdc07c29379c6b87eb7a38cc6a91ea4134b05ae79cd4cee
-
SHA512
b952ab5decbccf0563329557bd3e6693e9055759e0faf4118a6f212e10f7fd010152945baf4af66d6f3683c833291596b67ea538461c521170c72a3436b8cd18
-
SSDEEP
3072:WH/8vZncsVLNsaGTK5YCuX3Tn6yPppppZppppppppppQppppppppZppppppppppL:DZnBhstK5PuHTnJPppppZppppppppppQ
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_414cb717a4cd9fc4b0e2b31638ecc274.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_414cb717a4cd9fc4b0e2b31638ecc274.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
pony
http://q.dkjparamediccollege.net/forum/viewtopic.php
http://q.dugongmozambique.com/forum/viewtopic.php
-
payload_url
http://emotioncaribbean.com.do/P433n.exe
http://imecetemizlik.com/KZyKEM.exe
Targets
-
-
Target
JaffaCakes118_414cb717a4cd9fc4b0e2b31638ecc274
-
Size
133KB
-
MD5
414cb717a4cd9fc4b0e2b31638ecc274
-
SHA1
641a95f3b20e3ce2e1e201af1517a4b18b4d3f8a
-
SHA256
02a49c7d74b80caf9cdc07c29379c6b87eb7a38cc6a91ea4134b05ae79cd4cee
-
SHA512
b952ab5decbccf0563329557bd3e6693e9055759e0faf4118a6f212e10f7fd010152945baf4af66d6f3683c833291596b67ea538461c521170c72a3436b8cd18
-
SSDEEP
3072:WH/8vZncsVLNsaGTK5YCuX3Tn6yPppppZppppppppppQppppppppZppppppppppL:DZnBhstK5PuHTnJPppppZppppppppppQ
-
Pony family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-