General
-
Target
JaffaCakes118_a0f648d4ab25b9b1feaf44c3fa37446e
-
Size
80KB
-
Sample
250408-wtm65sxqw5
-
MD5
a0f648d4ab25b9b1feaf44c3fa37446e
-
SHA1
4aa36160eae1b1b108cd47aba5ccc4948059da89
-
SHA256
c2ddd5f7ebe8f2b9a1e0b95507191af9d6f9ef71d50d4b17ef696a5aaf7f2757
-
SHA512
6d074b63b5af67f76945613cd0e262f9c3cb28ec6a7b383b4742a7282b3626adc5b2a607c24b500a39acd128ac889a45d4c95fb32d1ebdb384ec88016df8b430
-
SSDEEP
1536:iBWlgyhcT3fGysqHZrqVtgPgvkdzSOsZiAMt8TbMKG:mWlDhcTHdgSPgvkdXsZiAlbM
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a0f648d4ab25b9b1feaf44c3fa37446e.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
pony
http://pglipik.ru:2346/pony/mac.php
http://pfixsel.ru:2346/pony/mac.php
Targets
-
-
Target
JaffaCakes118_a0f648d4ab25b9b1feaf44c3fa37446e
-
Size
80KB
-
MD5
a0f648d4ab25b9b1feaf44c3fa37446e
-
SHA1
4aa36160eae1b1b108cd47aba5ccc4948059da89
-
SHA256
c2ddd5f7ebe8f2b9a1e0b95507191af9d6f9ef71d50d4b17ef696a5aaf7f2757
-
SHA512
6d074b63b5af67f76945613cd0e262f9c3cb28ec6a7b383b4742a7282b3626adc5b2a607c24b500a39acd128ac889a45d4c95fb32d1ebdb384ec88016df8b430
-
SSDEEP
1536:iBWlgyhcT3fGysqHZrqVtgPgvkdzSOsZiAMt8TbMKG:mWlDhcTHdgSPgvkdXsZiAlbM
-
Pony family
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3