General
-
Target
JaffaCakes118_6f6b73ef7c960ef4c1dc62bd6ba51bf0
-
Size
195KB
-
Sample
250201-h93d4swlam
-
MD5
6f6b73ef7c960ef4c1dc62bd6ba51bf0
-
SHA1
c241b49e3373a9d5ac32ce57b792f89ba7fdf4f2
-
SHA256
07ce1b531c7432b233f857b58b4a3e15df74ab98afbb97dc4c25fe4005be0934
-
SHA512
7b9586a9eb315b60b0e8b3f4eae99741853d7ca051e6287061c1a32a5a70f29e4986dc908d3cde7c04ccdcbc9b018655faf81168258b705e60493c10ad75e825
-
SSDEEP
1536:6wFiGSZwofmOKU+sDW7KuTWFooxeOWZin5h9RwcdQvnSCYU39WRzINsAwCq0h1vR:+GSZHdKU+sDL5FoDOfn5nRw8mbWRzKT
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6f6b73ef7c960ef4c1dc62bd6ba51bf0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6f6b73ef7c960ef4c1dc62bd6ba51bf0.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
pony
http://healthatlas.org.au:8080/forum/viewtopic.php
http://70.32.108.192:8080/forum/viewtopic.php
http://www.awdoh-cpa.com:8080/forum/viewtopic.php
http://195.225.168.127:8080/forum/viewtopic.php
-
payload_url
http://technikspezi.de/4zWryv2E.exe
http://spielwiese.bolde.de/6Qp9tgVa.exe
http://shop.legatusrecords.net/Ysi.exe
Targets
-
-
Target
JaffaCakes118_6f6b73ef7c960ef4c1dc62bd6ba51bf0
-
Size
195KB
-
MD5
6f6b73ef7c960ef4c1dc62bd6ba51bf0
-
SHA1
c241b49e3373a9d5ac32ce57b792f89ba7fdf4f2
-
SHA256
07ce1b531c7432b233f857b58b4a3e15df74ab98afbb97dc4c25fe4005be0934
-
SHA512
7b9586a9eb315b60b0e8b3f4eae99741853d7ca051e6287061c1a32a5a70f29e4986dc908d3cde7c04ccdcbc9b018655faf81168258b705e60493c10ad75e825
-
SSDEEP
1536:6wFiGSZwofmOKU+sDW7KuTWFooxeOWZin5h9RwcdQvnSCYU39WRzINsAwCq0h1vR:+GSZHdKU+sDL5FoDOfn5nRw8mbWRzKT
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-