General

  • Target

    dba9bcf9bc119a4a70cc3de232de23b4_JaffaCakes118

  • Size

    128KB

  • Sample

    240912-c3snfawhqk

  • MD5

    dba9bcf9bc119a4a70cc3de232de23b4

  • SHA1

    21573a01c7a6510a99d1b4f70851a2014c83a65d

  • SHA256

    3a6829b2d07b72ab80c686c36d09ef8e792858cd5981917ede7aad2e02e8869d

  • SHA512

    c39e8d45857a4b90b4b5c19cb529a992d8a7ea16d1002204ebfc1d2a0e45910ec2f0ebbcd3d7430c785faa405c088bd229028d5a4d6289261f70c567f56ad7bb

  • SSDEEP

    3072:uGHi6mwpfjNHsXJNYxHWPKBV4ENNoDjrqVDAEmJI:++fjOXJSxH54ENijrODAE

Malware Config

Extracted

Family

pony

C2

http://67.215.225.205:8080/ponys/gate.php

http://216.231.139.111/ponys/gate.php

Attributes
  • payload_url

    http://build-in.cz/CBopQ0TA/YD94an.exe

    http://heincountry.com/Lx38YeDG/PZ2AC.exe

    http://waxsurfers.com/KrYtpYBC/a0Y.exe

Targets

    • Target

      dba9bcf9bc119a4a70cc3de232de23b4_JaffaCakes118

    • Size

      128KB

    • MD5

      dba9bcf9bc119a4a70cc3de232de23b4

    • SHA1

      21573a01c7a6510a99d1b4f70851a2014c83a65d

    • SHA256

      3a6829b2d07b72ab80c686c36d09ef8e792858cd5981917ede7aad2e02e8869d

    • SHA512

      c39e8d45857a4b90b4b5c19cb529a992d8a7ea16d1002204ebfc1d2a0e45910ec2f0ebbcd3d7430c785faa405c088bd229028d5a4d6289261f70c567f56ad7bb

    • SSDEEP

      3072:uGHi6mwpfjNHsXJNYxHWPKBV4ENNoDjrqVDAEmJI:++fjOXJSxH54ENijrODAE

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks