General

  • Target

    7558a4fd6d02088af0dfe037d65b3ba8_JaffaCakes118

  • Size

    128KB

  • Sample

    240726-xwajhayfkl

  • MD5

    7558a4fd6d02088af0dfe037d65b3ba8

  • SHA1

    a629d3b3a2be9dff9148dfe3f196ca009450d213

  • SHA256

    787eb4ea6564216ff0c1ebca1525a5da3583a1ac0132d594410a731ec75e03f5

  • SHA512

    8ee56a2b75fc47e5cb4a2e8bb26071caa59473ab51147aea7cc2a0ff1a6a4db31065387b0d077d66835edd9bb1b536c52232e3b6ce43b22243805efd2fe2bf40

  • SSDEEP

    3072:BcF9U7fedv/5t0sLtPEFNwFL2+n3uhlMw6W6psV:Bc7Se9RtZdsGnwMwlV

Malware Config

Extracted

Family

pony

C2

http://200.72.183.54:81/pony/gate.php

http://91.121.84.204:8080/pony/gate.php

Attributes
  • payload_url

    http://power-tec.sk/D8aoPu86/XPVqAGE.exe

    http://synergieassurance.com/AnJVfWxx/aFa.exe

    http://mdesignsc.com/ZkUXt0nM/wgZ6S.exe

Targets

    • Target

      7558a4fd6d02088af0dfe037d65b3ba8_JaffaCakes118

    • Size

      128KB

    • MD5

      7558a4fd6d02088af0dfe037d65b3ba8

    • SHA1

      a629d3b3a2be9dff9148dfe3f196ca009450d213

    • SHA256

      787eb4ea6564216ff0c1ebca1525a5da3583a1ac0132d594410a731ec75e03f5

    • SHA512

      8ee56a2b75fc47e5cb4a2e8bb26071caa59473ab51147aea7cc2a0ff1a6a4db31065387b0d077d66835edd9bb1b536c52232e3b6ce43b22243805efd2fe2bf40

    • SSDEEP

      3072:BcF9U7fedv/5t0sLtPEFNwFL2+n3uhlMw6W6psV:Bc7Se9RtZdsGnwMwlV

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Credentials from Password Stores

1
T1555

Credentials from Web Browsers

1
T1555.003

Unsecured Credentials

3
T1552

Credentials In Files

3
T1552.001

Discovery

Query Registry

1
T1012

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Collection

Data from Local System

2
T1005

Tasks