General

  • Target

    4c7a8765b515d3ad48e36c0d1f63d958_JaffaCakes118

  • Size

    89KB

  • Sample

    240729-rysj7sxbmf

  • MD5

    4c7a8765b515d3ad48e36c0d1f63d958

  • SHA1

    ee4057df317a38dece26ca0d07322662a880e23b

  • SHA256

    286f70a141947be49020336923abe4a29fa30e91ae261ef0b96a64a931c8878c

  • SHA512

    3c7b80890b079a0ca9d85b2f90dca835ac3fdc3348248236e2199bc55babcf26c0e703b837969bf2a2d8262b744a3d5b108b62559d4c67283b7e9f3457bb644e

  • SSDEEP

    1536:9EYAfk9qTMaPexa3S7Q0vgmojELObNt+OFXLlYTvEE6ikzmi:uY/68Q0Imo4OJ3E66i

Malware Config

Extracted

Family

pony

C2

http://gitarisgitarplus.com/wp-admeans/gate.php

Targets

    • Target

      4c7a8765b515d3ad48e36c0d1f63d958_JaffaCakes118

    • Size

      89KB

    • MD5

      4c7a8765b515d3ad48e36c0d1f63d958

    • SHA1

      ee4057df317a38dece26ca0d07322662a880e23b

    • SHA256

      286f70a141947be49020336923abe4a29fa30e91ae261ef0b96a64a931c8878c

    • SHA512

      3c7b80890b079a0ca9d85b2f90dca835ac3fdc3348248236e2199bc55babcf26c0e703b837969bf2a2d8262b744a3d5b108b62559d4c67283b7e9f3457bb644e

    • SSDEEP

      1536:9EYAfk9qTMaPexa3S7Q0vgmojELObNt+OFXLlYTvEE6ikzmi:uY/68Q0Imo4OJ3E66i

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks