General

  • Target

    db2ccb95479e796235fb068ba204d743_JaffaCakes118

  • Size

    91KB

  • Sample

    240911-zeh6esscqg

  • MD5

    db2ccb95479e796235fb068ba204d743

  • SHA1

    719ae3acaae54add34f2d0b48465b94ba8327ba8

  • SHA256

    dbce2f97b36e6796f6e2eda21e63d51e9fe677282ca39f3a6a7cc71b84de8a69

  • SHA512

    55bc2580b53039e8e14733a7ee269d91b1ba8b70dc3047ee1f8fca6a84c3a04a993695e53e5951a0235ff5f89e2309bff64aba3cd4cf1621bfbb7c5d6ca2e497

  • SSDEEP

    1536:NcWciICSGqTogN/i7kpzebN9zPBSw3ZrYe5NQhcZ8aOQI3lTvVEyLkzmVZ:azCSf8k4N9zPBSirJ5eaOb3fEyzH

Malware Config

Extracted

Family

pony

C2

http://archiv.social-neos.eu:8080/ponyb/gate.php

http://cloud.social-neos.eu:8080/ponyb/gate.php

http://eyon-neos.eu:8080/ponyb/gate.php

http://quest.social-neos.eu:8080/ponyb/gate.php

Attributes
  • payload_url

    http://ray-casino.com/gBV.exe

    http://sarafhospitality.com/bemfsH.exe

    http://naturamalta.com/byc.exe

    http://manavjeevankalyansamiti.org/n9V.exe

    http://gmdsoft.com/5Gc0Um8h.exe

Targets

    • Target

      db2ccb95479e796235fb068ba204d743_JaffaCakes118

    • Size

      91KB

    • MD5

      db2ccb95479e796235fb068ba204d743

    • SHA1

      719ae3acaae54add34f2d0b48465b94ba8327ba8

    • SHA256

      dbce2f97b36e6796f6e2eda21e63d51e9fe677282ca39f3a6a7cc71b84de8a69

    • SHA512

      55bc2580b53039e8e14733a7ee269d91b1ba8b70dc3047ee1f8fca6a84c3a04a993695e53e5951a0235ff5f89e2309bff64aba3cd4cf1621bfbb7c5d6ca2e497

    • SSDEEP

      1536:NcWciICSGqTogN/i7kpzebN9zPBSw3ZrYe5NQhcZ8aOQI3lTvVEyLkzmVZ:azCSf8k4N9zPBSirJ5eaOb3fEyzH

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks