General
-
Target
JaffaCakes118_8fee18f173182330b846e3072bfe525e
-
Size
80KB
-
Sample
250329-wmrkzsvxet
-
MD5
8fee18f173182330b846e3072bfe525e
-
SHA1
a5979634d4fec771ba68806dd840378c140a8b2a
-
SHA256
05065af2d4c16c65688a9efaa33c10fd9d36aa7fccf8b68621812db19456e4e6
-
SHA512
2226a301343ccac1b05395e371006fdb2a1ad7419af5fb4f7bdd38427d0ec416a1e945f7174b8a73ff47e80079c18c59fa6977aaae2fe527a9f68473f0c9edee
-
SSDEEP
1536:GGc5gq5nde3r4ZXsRe9Pbd0AwLOTYRdAKGmaeQe95DNSquOLcuer/E9kCA:GGc7cb41rtTYv+FevcfOLcuCwfA
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8fee18f173182330b846e3072bfe525e.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8fee18f173182330b846e3072bfe525e.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
pony
http://klearcity.info:2346/pony/mac.php
http://slomtexs.info:2346/pony/mac.php
-
payload_url
http://klearcity.info:2346/pony/view/kos.exe
Targets
-
-
Target
JaffaCakes118_8fee18f173182330b846e3072bfe525e
-
Size
80KB
-
MD5
8fee18f173182330b846e3072bfe525e
-
SHA1
a5979634d4fec771ba68806dd840378c140a8b2a
-
SHA256
05065af2d4c16c65688a9efaa33c10fd9d36aa7fccf8b68621812db19456e4e6
-
SHA512
2226a301343ccac1b05395e371006fdb2a1ad7419af5fb4f7bdd38427d0ec416a1e945f7174b8a73ff47e80079c18c59fa6977aaae2fe527a9f68473f0c9edee
-
SSDEEP
1536:GGc5gq5nde3r4ZXsRe9Pbd0AwLOTYRdAKGmaeQe95DNSquOLcuer/E9kCA:GGc7cb41rtTYv+FevcfOLcuCwfA
-
Pony family
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3