General

  • Target

    3f23d34de89964c8a88ecac2e99c0515_JaffaCakes118

  • Size

    154KB

  • Sample

    240729-lxx6eawdnh

  • MD5

    3f23d34de89964c8a88ecac2e99c0515

  • SHA1

    8132693b96def5dc8c65b6d13ac6af18473b806b

  • SHA256

    9abafb11d4f5389d7602b98f3e0fc001aa2fc80df1bd7accb854533db1a71122

  • SHA512

    020f19751c37a08087e0d3d14019c907070573cdca03d0d832a2271a839be48f6a363e6740dac87f17221e677307ac4b0dc71ce5713739bfa1cf1e120e34bf5c

  • SSDEEP

    1536:l7pcSHzXM1Rl4rti6l0emI0ViB3713ibVrkiBcUuMG7sWIaM1V/K6qfTmwL9En2K:hpcSHqR4iemc39ibhruMGOVrgTBc2K

Malware Config

Extracted

Family

pony

C2

http://sam-latrilogie.com:8080/pony/gate.php

http://loceanic.fr:8080/pony/gate.php

Attributes
  • payload_url

    http://download.avmap.it/85qxdKc6/pThNZir.exe

    http://christianlifechurchmentor.org/1ZUDXGZp/XAaQa42.exe

    http://arwebs.com.ar/mtpXJLjM/KVG0go.exe

    http://advancewebsites.com/mVZtnnSu/DbQip.exe

Targets

    • Target

      3f23d34de89964c8a88ecac2e99c0515_JaffaCakes118

    • Size

      154KB

    • MD5

      3f23d34de89964c8a88ecac2e99c0515

    • SHA1

      8132693b96def5dc8c65b6d13ac6af18473b806b

    • SHA256

      9abafb11d4f5389d7602b98f3e0fc001aa2fc80df1bd7accb854533db1a71122

    • SHA512

      020f19751c37a08087e0d3d14019c907070573cdca03d0d832a2271a839be48f6a363e6740dac87f17221e677307ac4b0dc71ce5713739bfa1cf1e120e34bf5c

    • SSDEEP

      1536:l7pcSHzXM1Rl4rti6l0emI0ViB3713ibVrkiBcUuMG7sWIaM1V/K6qfTmwL9En2K:hpcSHqR4iemc39ibhruMGOVrgTBc2K

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks