General
-
Target
JaffaCakes118_5a1180ecba01d7feddb5da75ca04c112
-
Size
132KB
-
Sample
250129-w7zr4avlgn
-
MD5
5a1180ecba01d7feddb5da75ca04c112
-
SHA1
b0d5b40ca5da74e4d5131166470d9b15031d61e4
-
SHA256
3c3874247af17a1e69899bbd2e71f3791a5d9d53fdabc76cbb1dca15e8048583
-
SHA512
84b6fee78de918b6a2d0e8ef7c0339caabdfff8c90f73f18908aa03b6ca041cac7737846e31af9b904b0793d2aa73bf990f5ad9fcee9fa873b22421ee97dbe26
-
SSDEEP
1536:RojZXPLmxwHOU72o6lr1byvwDIc6+0D5lyMd9oMb3uW4gFsuzCdBxhFapEfz63Lu:SKFQ7eYRcTel7rx4U4dHaqmTi8D
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5a1180ecba01d7feddb5da75ca04c112.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5a1180ecba01d7feddb5da75ca04c112.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
pony
http://205.185.125.165:8080/forum/viewtopic.php
http://ads.9bravo.com:8080/forum/viewtopic.php
http://banner.9bravo.com:8080/forum/viewtopic.php
http://cache.9bravo.com:8080/forum/viewtopic.php
-
payload_url
http://ftp.coldwellbankerthomas.com/1J5sBaVR.exe
http://inthe1970s.com/6vVbwcB.exe
http://ftp.triatlonbb.sk/ddKt.exe
Targets
-
-
Target
JaffaCakes118_5a1180ecba01d7feddb5da75ca04c112
-
Size
132KB
-
MD5
5a1180ecba01d7feddb5da75ca04c112
-
SHA1
b0d5b40ca5da74e4d5131166470d9b15031d61e4
-
SHA256
3c3874247af17a1e69899bbd2e71f3791a5d9d53fdabc76cbb1dca15e8048583
-
SHA512
84b6fee78de918b6a2d0e8ef7c0339caabdfff8c90f73f18908aa03b6ca041cac7737846e31af9b904b0793d2aa73bf990f5ad9fcee9fa873b22421ee97dbe26
-
SSDEEP
1536:RojZXPLmxwHOU72o6lr1byvwDIc6+0D5lyMd9oMb3uW4gFsuzCdBxhFapEfz63Lu:SKFQ7eYRcTel7rx4U4dHaqmTi8D
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-