General
-
Target
JaffaCakes118_966c06c886b96c4ed6456f25098b2fd5
-
Size
143KB
-
Sample
250329-ync54axwbs
-
MD5
966c06c886b96c4ed6456f25098b2fd5
-
SHA1
babf695bf13705b33ab38b1b0974ffa6f82d1932
-
SHA256
1612544e40aa8528f3f81bce4f70dfdf242d35292d214009188684ed7a90347a
-
SHA512
25fe18f07e790817a07d1e8c42985a0ae108d449e01d0f7aeecfd8b0aa9ab41ba1f34784ffcb3462a09e2417fbc84d47cbfe51c48a6544388548bf0dd8254668
-
SSDEEP
3072:35nExeYqP9dWUlg/EIVWGP3UUjC3HIkFe++BC0E4t:JGXUlg/EmaokFI
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_966c06c886b96c4ed6456f25098b2fd5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_966c06c886b96c4ed6456f25098b2fd5.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
pony
http://eyon-neos.eu:8080/ponyz/gate.php
http://quest.social-neos.eu:8080/ponyz/gate.php
http://social-neos.eu:8080/ponyz/gate.php
http://carmine.warsheet.com:8080/ponyz/gate.php
-
payload_url
http://labuenauva.es/00X6.exe
http://miamisburgoptimist.com/hWHL.exe
http://reviewmortgages.com.au/5K8ocPLE.exe
http://accounttech.com.au/CJCGiF.exe
http://www.canal4.net/GWPuY.exe
Targets
-
-
Target
JaffaCakes118_966c06c886b96c4ed6456f25098b2fd5
-
Size
143KB
-
MD5
966c06c886b96c4ed6456f25098b2fd5
-
SHA1
babf695bf13705b33ab38b1b0974ffa6f82d1932
-
SHA256
1612544e40aa8528f3f81bce4f70dfdf242d35292d214009188684ed7a90347a
-
SHA512
25fe18f07e790817a07d1e8c42985a0ae108d449e01d0f7aeecfd8b0aa9ab41ba1f34784ffcb3462a09e2417fbc84d47cbfe51c48a6544388548bf0dd8254668
-
SSDEEP
3072:35nExeYqP9dWUlg/EIVWGP3UUjC3HIkFe++BC0E4t:JGXUlg/EmaokFI
-
Pony family
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-