General
-
Target
JaffaCakes118_8af4acbd725e34fc289d81674ae0e844
-
Size
76KB
-
Sample
250328-yq81jssms8
-
MD5
8af4acbd725e34fc289d81674ae0e844
-
SHA1
280156c357b97055ca30f0a01ed359ed0db0f3e4
-
SHA256
3dc18a14696e3abaaadee89c32ff60a963be38e7491b4fef3e7ecd59b2cd05d7
-
SHA512
033f19e9aecf23f15e8594c3ffa1595000cc5c43116f700c04c774ea4f9d1db880701514a3d8a89b2cca2824f1a177aa0202439bd6a2290a0fef265232f305d9
-
SSDEEP
1536:TrleJBx2zq+5hRpfvK7DKYM7zuM9GEKjgMqBit7HAko8Uck86LSUOLbJE/C6Qt:PlyDKB7qMcEKNqcn7ySUO3+6T
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8af4acbd725e34fc289d81674ae0e844.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
pony
http://salstatic.info:2346/pony/mac.php
http://nextstats.info:2346/pony/mac.php
Targets
-
-
Target
JaffaCakes118_8af4acbd725e34fc289d81674ae0e844
-
Size
76KB
-
MD5
8af4acbd725e34fc289d81674ae0e844
-
SHA1
280156c357b97055ca30f0a01ed359ed0db0f3e4
-
SHA256
3dc18a14696e3abaaadee89c32ff60a963be38e7491b4fef3e7ecd59b2cd05d7
-
SHA512
033f19e9aecf23f15e8594c3ffa1595000cc5c43116f700c04c774ea4f9d1db880701514a3d8a89b2cca2824f1a177aa0202439bd6a2290a0fef265232f305d9
-
SSDEEP
1536:TrleJBx2zq+5hRpfvK7DKYM7zuM9GEKjgMqBit7HAko8Uck86LSUOLbJE/C6Qt:PlyDKB7qMcEKNqcn7ySUO3+6T
-
Pony family
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Files and Directories
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3