General

  • Target

    b4719f2c1ca605515b4402b442e1c5b4_JaffaCakes118

  • Size

    115KB

  • Sample

    240821-wgn8nswckq

  • MD5

    b4719f2c1ca605515b4402b442e1c5b4

  • SHA1

    122a2bbc38abfd1989970f9b9c314fc64f6c63dc

  • SHA256

    9f0d84a700f15363e8d6c6438ebe522babf38b861554abff82f670a99678b22f

  • SHA512

    94df40e5df0db9f2e2eaa8b6d3cd1ebc2c11d6d4ba32b9520273c6d36c3140b7ea4052da93ddec5825bbcb5bc2803ab623fc1c2641164f93d5362f197b8317c3

  • SSDEEP

    3072:PuYp/iBh3l1z03fn8Dav6ehyw817x5xNVMvT83meu/wowEwcU:M3Pz0GegPFdHGTJMl

Malware Config

Extracted

Family

pony

C2

http://176.28.18.135:8080/pony/gate.php

http://85.214.243.87:8080/pony/gate.php

http://88.85.99.44:8080/pony/gate.php

Attributes
  • payload_url

    http://cinecolor.com.ar/GPFito.exe

    http://www.bizsizanayasaolmaz.org/7qf7CV.exe

    http://www.cyrpainting.cl/p6h.exe

    http://hellenic-antiaging-academy.gr/2wY.exe

Targets

    • Target

      b4719f2c1ca605515b4402b442e1c5b4_JaffaCakes118

    • Size

      115KB

    • MD5

      b4719f2c1ca605515b4402b442e1c5b4

    • SHA1

      122a2bbc38abfd1989970f9b9c314fc64f6c63dc

    • SHA256

      9f0d84a700f15363e8d6c6438ebe522babf38b861554abff82f670a99678b22f

    • SHA512

      94df40e5df0db9f2e2eaa8b6d3cd1ebc2c11d6d4ba32b9520273c6d36c3140b7ea4052da93ddec5825bbcb5bc2803ab623fc1c2641164f93d5362f197b8317c3

    • SSDEEP

      3072:PuYp/iBh3l1z03fn8Dav6ehyw817x5xNVMvT83meu/wowEwcU:M3Pz0GegPFdHGTJMl

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks