General

  • Target

    018a2901381a4b695fda4ef34cd97fc0_JaffaCakes118

  • Size

    108KB

  • Sample

    240620-a8sjhstgqj

  • MD5

    018a2901381a4b695fda4ef34cd97fc0

  • SHA1

    b0c7e779575652d3c4f22da640d0ee5c97d51401

  • SHA256

    9d6cec837b4e011e123e9248687da1f01fde790449777a3cf88d2827aa5bc7cb

  • SHA512

    ff8812593ae473191d603cb9c6bafd7074891c12c8da90e31c4e38f234cb67f0d02d2105cd2f854b83998ff6e829404dab4aa209effdc6f554f15aa13e492836

  • SSDEEP

    3072:ctOa6kA/YCP3F1ECSHAkorFHxYllAB2s1U:Y61TP3F/cAcllAk

Malware Config

Extracted

Family

pony

C2

http://91.121.84.204:8080/pony/gate.php

http://91.121.93.178:8080/pony/gate.php

Attributes
  • payload_url

    http://power-tec.sk/D8aoPu86/XPVqAGE.exe

    http://synergieassurance.com/AnJVfWxx/aFa.exe

Targets

    • Target

      018a2901381a4b695fda4ef34cd97fc0_JaffaCakes118

    • Size

      108KB

    • MD5

      018a2901381a4b695fda4ef34cd97fc0

    • SHA1

      b0c7e779575652d3c4f22da640d0ee5c97d51401

    • SHA256

      9d6cec837b4e011e123e9248687da1f01fde790449777a3cf88d2827aa5bc7cb

    • SHA512

      ff8812593ae473191d603cb9c6bafd7074891c12c8da90e31c4e38f234cb67f0d02d2105cd2f854b83998ff6e829404dab4aa209effdc6f554f15aa13e492836

    • SSDEEP

      3072:ctOa6kA/YCP3F1ECSHAkorFHxYllAB2s1U:Y61TP3F/cAcllAk

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks