General

  • Target

    cf171f2101909432a402b6a602cac991_JaffaCakes118

  • Size

    147KB

  • Sample

    240906-j59s3awcqf

  • MD5

    cf171f2101909432a402b6a602cac991

  • SHA1

    34e2d6531148d036c36bd7c10b42dbe38d5782dd

  • SHA256

    066c9e63db9ff025880b515ff584da95a1a45db2519f774dc12f1513a6a37494

  • SHA512

    73bbd24349121af25622998dbf08dec887bbf0b65af184370c3c0b65c69b593dbc380f340e22c10779b726f90dbcf3f8113ad62a1fedc828d2bc7c2014d41316

  • SSDEEP

    3072:z5Rfr1ZZpFhVpnd1GIILYOLZpJoFny6moAitgmHyX7UoDl:z5tr5BVFd57OLDDigmSLD

Malware Config

Extracted

Family

pony

C2

http://217.20.117.145:8080/pony/gate.php

http://217.20.118.117:8080/pony/gate.php

Attributes
  • payload_url

    http://www.uniaotec.com.br/0Yoo6.exe

    http://216.119.80.138/KY5.exe

    http://ftp.videoheretic.com/vFs6cZZ.exe

Targets

    • Target

      cf171f2101909432a402b6a602cac991_JaffaCakes118

    • Size

      147KB

    • MD5

      cf171f2101909432a402b6a602cac991

    • SHA1

      34e2d6531148d036c36bd7c10b42dbe38d5782dd

    • SHA256

      066c9e63db9ff025880b515ff584da95a1a45db2519f774dc12f1513a6a37494

    • SHA512

      73bbd24349121af25622998dbf08dec887bbf0b65af184370c3c0b65c69b593dbc380f340e22c10779b726f90dbcf3f8113ad62a1fedc828d2bc7c2014d41316

    • SSDEEP

      3072:z5Rfr1ZZpFhVpnd1GIILYOLZpJoFny6moAitgmHyX7UoDl:z5tr5BVFd57OLDDigmSLD

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks