General

  • Target

    3c4685a5fa80148d418316b8b4b03547_JaffaCakes118

  • Size

    455KB

  • Sample

    240729-jemwlssgrg

  • MD5

    3c4685a5fa80148d418316b8b4b03547

  • SHA1

    4582ff5221aff00a7600d1d09c147634c5aa4b6b

  • SHA256

    00ea07e4d889d339effc1b6c4f80e18805c207c47132ea1f7ffef14648e415bc

  • SHA512

    2244562b4557fa69968dbb36e1dc5b231b2860ab260220f83919f627241a36a205c946847ada6e26bb0755c83272ed46fd01b5772baa6a0959ffdfbe086c6cd3

  • SSDEEP

    12288:rulEEMj2DSNPlr23b2fydhLPhH1OAo2t41d:rwEEMjWIh2gYOAs1d

Malware Config

Extracted

Family

pony

C2

http://montacutepre-school.co.uk/anotherpony/panelnew/gate.php

Targets

    • Target

      3c4685a5fa80148d418316b8b4b03547_JaffaCakes118

    • Size

      455KB

    • MD5

      3c4685a5fa80148d418316b8b4b03547

    • SHA1

      4582ff5221aff00a7600d1d09c147634c5aa4b6b

    • SHA256

      00ea07e4d889d339effc1b6c4f80e18805c207c47132ea1f7ffef14648e415bc

    • SHA512

      2244562b4557fa69968dbb36e1dc5b231b2860ab260220f83919f627241a36a205c946847ada6e26bb0755c83272ed46fd01b5772baa6a0959ffdfbe086c6cd3

    • SSDEEP

      12288:rulEEMj2DSNPlr23b2fydhLPhH1OAo2t41d:rwEEMjWIh2gYOAs1d

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks