General

  • Target

    d864ae889644e670a0fe2abcca6380d0_JaffaCakes118

  • Size

    1.1MB

  • Sample

    240910-ryblpaxhjj

  • MD5

    d864ae889644e670a0fe2abcca6380d0

  • SHA1

    76cc3a2a160a6c8c5d9b5ed0740989b21254d39a

  • SHA256

    f0d939c064143d94f7a02bff4f044929b4fc6c1e6e49effd5e3e0f9821bccc78

  • SHA512

    e4c38dd81e5a9c09f8bfb0341c3fd376ac8bd8ee6d05d3f2a0691e60355b55bd6901ac1e1b557ad2388bedf2d30510aeac77463f19c5247bf4dae7e343ce5d15

  • SSDEEP

    12288:u27nW2TKwrom3Qxn6baB2zOwbcDCLlfrrTz91m3WtuB1jnEAlXcgtXb22:l5TKwcKQx6+czOYcmRfrzquubJsgtX

Malware Config

Extracted

Family

pony

C2

http://donjack.co.uk/val/gate.php

Attributes
  • payload_url

    http://donjack.co.uk/val/val.exe

Targets

    • Target

      d864ae889644e670a0fe2abcca6380d0_JaffaCakes118

    • Size

      1.1MB

    • MD5

      d864ae889644e670a0fe2abcca6380d0

    • SHA1

      76cc3a2a160a6c8c5d9b5ed0740989b21254d39a

    • SHA256

      f0d939c064143d94f7a02bff4f044929b4fc6c1e6e49effd5e3e0f9821bccc78

    • SHA512

      e4c38dd81e5a9c09f8bfb0341c3fd376ac8bd8ee6d05d3f2a0691e60355b55bd6901ac1e1b557ad2388bedf2d30510aeac77463f19c5247bf4dae7e343ce5d15

    • SSDEEP

      12288:u27nW2TKwrom3Qxn6baB2zOwbcDCLlfrrTz91m3WtuB1jnEAlXcgtXb22:l5TKwcKQx6+czOYcmRfrzquubJsgtX

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks