General

  • Target

    7037ad8756a03bcd76f5632897c8d6d7_JaffaCakes118

  • Size

    153KB

  • Sample

    240725-s6r43s1gkg

  • MD5

    7037ad8756a03bcd76f5632897c8d6d7

  • SHA1

    993dcc411dd236b10770691588ac39267f0f063e

  • SHA256

    f4315ead48f427602269c76972cd3cf9de48dbd471fcf63cd22458729dc57e04

  • SHA512

    c9c39fe82d299177202faeb3da8d920620eee1137604be222fb0bb38335f4088240023fa157aa797f3b6cace250bcac2d000dd829baf07f54eb595bbc69be36f

  • SSDEEP

    3072:CUG0qvTNFMJFHXQEkQkS6vmCNQMblOZhpwXuqOSe:CUSvTNFMHHXQHQkjNVl4wXBv

Malware Config

Extracted

Family

pony

C2

http://67.215.225.205:8080/ponys/gate.php

http://216.231.139.111/ponys/gate.php

Attributes
  • payload_url

    http://123-engagement-ring.com/F2ziEErm.exe

    http://sultanesmonterrey.com/6VRjCFx.exe

    http://cafedoc.info/BxvUvh.exe

    http://butelii-oxigen.ro/fojJM.exe

    http://aurangabadproperties.com/rfoMUzmK.exe

Targets

    • Target

      7037ad8756a03bcd76f5632897c8d6d7_JaffaCakes118

    • Size

      153KB

    • MD5

      7037ad8756a03bcd76f5632897c8d6d7

    • SHA1

      993dcc411dd236b10770691588ac39267f0f063e

    • SHA256

      f4315ead48f427602269c76972cd3cf9de48dbd471fcf63cd22458729dc57e04

    • SHA512

      c9c39fe82d299177202faeb3da8d920620eee1137604be222fb0bb38335f4088240023fa157aa797f3b6cace250bcac2d000dd829baf07f54eb595bbc69be36f

    • SSDEEP

      3072:CUG0qvTNFMJFHXQEkQkS6vmCNQMblOZhpwXuqOSe:CUSvTNFMHHXQHQkjNVl4wXBv

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Credentials from Password Stores

1
T1555

Credentials from Web Browsers

1
T1555.003

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Discovery

Query Registry

1
T1012

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Tasks