General

  • Target

    ca499304eff684a397d293b920448a0d_JaffaCakes118

  • Size

    92KB

  • Sample

    240830-gcg68syemf

  • MD5

    ca499304eff684a397d293b920448a0d

  • SHA1

    260a9190d63f7c2cb16c1ad4837dea85cc058dd6

  • SHA256

    9580c659358b871c395a2a782740209b2403896a0811e26732388e4f837aaf15

  • SHA512

    67bbbee2f6306dbfaa1356a7d17599c8614977c8586aed42b4b25a27897d5504c9feab2320e5751280e88ce8fa0222aeae76892882f4fe7b87723b3b049db13b

  • SSDEEP

    1536:KiBtHbia9GTRKHeYjtOHkbvNcyMqh23Us9HMM7XPhOsyMZzXlLrixqMltbB5Aan4:KiLOEGT0HeSkIcy9h2rLXPQTWBLrSB54

Malware Config

Extracted

Family

pony

C2

http://78.129.132.239:8080/pony/gate.php

http://infovega.lt:8080/pony/gate.php

Attributes
  • payload_url

    http://www.eb3btz.com/72fTmEXk/w9ks9.exe

    http://ftp.imperiumit.com.br/gvoWhVVf/kmSdem1.exe

    http://lavanderiatingemais.com.br/F6EyS5D7/A5m.exe

Targets

    • Target

      ca499304eff684a397d293b920448a0d_JaffaCakes118

    • Size

      92KB

    • MD5

      ca499304eff684a397d293b920448a0d

    • SHA1

      260a9190d63f7c2cb16c1ad4837dea85cc058dd6

    • SHA256

      9580c659358b871c395a2a782740209b2403896a0811e26732388e4f837aaf15

    • SHA512

      67bbbee2f6306dbfaa1356a7d17599c8614977c8586aed42b4b25a27897d5504c9feab2320e5751280e88ce8fa0222aeae76892882f4fe7b87723b3b049db13b

    • SSDEEP

      1536:KiBtHbia9GTRKHeYjtOHkbvNcyMqh23Us9HMM7XPhOsyMZzXlLrixqMltbB5Aan4:KiLOEGT0HeSkIcy9h2rLXPQTWBLrSB54

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks