General
-
Target
JaffaCakes118_8de51b71c0726105d3344f1a7e900610
-
Size
81KB
-
Sample
250329-v5pnnsxzew
-
MD5
8de51b71c0726105d3344f1a7e900610
-
SHA1
98071fc6b0272ac7270990ccfde22ec06e7ff93d
-
SHA256
0edb9b20ce2bf4d937a56de8d9b1050f386a008b09c54e67b73dc5388c03c694
-
SHA512
457a25c3786e70d8c677b2877aed3b4a6d532ea02b9be3ab7c489ae0d0967c8726f871ed238f75ca7961a44bbe0138b46fbc8ed6b1509fa35c064f0d47ca052e
-
SSDEEP
1536:2eiGHzR1Hbg3qAteHCOYV4jD4QgbAS6kNmdtS3PRrWBfDsMUpCeS6tH:fzR1H0MDOj6amdM3oB7sMIS
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8de51b71c0726105d3344f1a7e900610.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8de51b71c0726105d3344f1a7e900610.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
pony
http://saleryplax.info:2346/pony/mac.php
http://derotins.info:2346/pony/mac.php
Targets
-
-
Target
JaffaCakes118_8de51b71c0726105d3344f1a7e900610
-
Size
81KB
-
MD5
8de51b71c0726105d3344f1a7e900610
-
SHA1
98071fc6b0272ac7270990ccfde22ec06e7ff93d
-
SHA256
0edb9b20ce2bf4d937a56de8d9b1050f386a008b09c54e67b73dc5388c03c694
-
SHA512
457a25c3786e70d8c677b2877aed3b4a6d532ea02b9be3ab7c489ae0d0967c8726f871ed238f75ca7961a44bbe0138b46fbc8ed6b1509fa35c064f0d47ca052e
-
SSDEEP
1536:2eiGHzR1Hbg3qAteHCOYV4jD4QgbAS6kNmdtS3PRrWBfDsMUpCeS6tH:fzR1H0MDOj6amdM3oB7sMIS
-
Pony family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3