General

  • Target

    77323e76f795f670416e6e3e11387fdf_JaffaCakes118

  • Size

    134KB

  • Sample

    240727-gva6mstfjb

  • MD5

    77323e76f795f670416e6e3e11387fdf

  • SHA1

    da8e005a2d156067eeaa5194bdf07e62d502d20b

  • SHA256

    f52184a90b77f8d31b9f4aafb45d90fa85cfd1fcf35a84eec62d85d8497f83d8

  • SHA512

    5b8e79214a94426ec727715c8b8c4bb4b6488d7e8ac0708e7cb9e915bd58fc678e45888e2e415bcfdd734f2a730e2a5607f03784a14c8dd6abe44d5b520c48ce

  • SSDEEP

    1536:p3PYxWVUYIfcmUDyDWf+OBIzHUsMRLbaDpSmfk4138dIaYi5jDJSx4WaVkoA/55i:RPY1lfeXOzUsqaP8+38ea95/QLaSBi

Malware Config

Extracted

Family

pony

C2

http://212.58.20.11:8080/pony/gate.php

http://72.46.140.12/pony/gate.php

Attributes
  • payload_url

    http://www.itprojectmanagement.ca/rvtZCwTD/m7SxH.exe

    http://romans.com.vn/wh2C1Yea/DNG3JN.exe

    http://www.kfchalle.be/MDXPZN0a/Fy8w0AP.exe

Targets

    • Target

      77323e76f795f670416e6e3e11387fdf_JaffaCakes118

    • Size

      134KB

    • MD5

      77323e76f795f670416e6e3e11387fdf

    • SHA1

      da8e005a2d156067eeaa5194bdf07e62d502d20b

    • SHA256

      f52184a90b77f8d31b9f4aafb45d90fa85cfd1fcf35a84eec62d85d8497f83d8

    • SHA512

      5b8e79214a94426ec727715c8b8c4bb4b6488d7e8ac0708e7cb9e915bd58fc678e45888e2e415bcfdd734f2a730e2a5607f03784a14c8dd6abe44d5b520c48ce

    • SSDEEP

      1536:p3PYxWVUYIfcmUDyDWf+OBIzHUsMRLbaDpSmfk4138dIaYi5jDJSx4WaVkoA/55i:RPY1lfeXOzUsqaP8+38ea95/QLaSBi

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks