General

  • Target

    7a578e67198290a06344ff80fff02edc_JaffaCakes118

  • Size

    98KB

  • Sample

    240527-yqtwmahd28

  • MD5

    7a578e67198290a06344ff80fff02edc

  • SHA1

    3aa7235821cc2713615aa3e70a0c248dcd3868b7

  • SHA256

    2ccf14072d0df3bf86e8651822ba5db94aea277db2bb1a19e9d1058d5ceaf41c

  • SHA512

    9bab2762e2b0d07534a63dfbcbf1643f402a0d1832304acc04353d7fb5b4ae32ac9a58d5bc1e9f0a2653c213c577ffa8e6232da0e397c7457b81618284fba047

  • SSDEEP

    1536:5goPDM9OqTiBarVbEPu87Y0VamSKTUVeb4OirpuZdTvBkzbkH2i/YzHD:WS498BzD80voOYp6YO2i/YL

Malware Config

Extracted

Family

pony

C2

http://iwillmakeitbigtime.cf/pony2/gate.php

Attributes
  • payload_url

    http://serverx.com/y/file.exe

Targets

    • Target

      7a578e67198290a06344ff80fff02edc_JaffaCakes118

    • Size

      98KB

    • MD5

      7a578e67198290a06344ff80fff02edc

    • SHA1

      3aa7235821cc2713615aa3e70a0c248dcd3868b7

    • SHA256

      2ccf14072d0df3bf86e8651822ba5db94aea277db2bb1a19e9d1058d5ceaf41c

    • SHA512

      9bab2762e2b0d07534a63dfbcbf1643f402a0d1832304acc04353d7fb5b4ae32ac9a58d5bc1e9f0a2653c213c577ffa8e6232da0e397c7457b81618284fba047

    • SSDEEP

      1536:5goPDM9OqTiBarVbEPu87Y0VamSKTUVeb4OirpuZdTvBkzbkH2i/YzHD:WS498BzD80voOYp6YO2i/YL

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

3
T1005

Email Collection

2
T1114

Tasks