General

  • Target

    dc9265de9a7d4fb67226da9a73fbb009_JaffaCakes118

  • Size

    137KB

  • Sample

    240912-thz1fssgqd

  • MD5

    dc9265de9a7d4fb67226da9a73fbb009

  • SHA1

    5d077c07c2bcda31e3f9d44f85cf07aac4be013a

  • SHA256

    708786ec9b2e3a8bd67d62177b4154a49d679bcde26587db69ddc3a4d64e03ef

  • SHA512

    700a28f3567d4501459e18e7a9a603995d1e7ee2b2d72f08e701bdcf5083edcbc9ad34bf4bcf163d4d8b1d5f2b6590db0d56555d59449ae8dba3bb8a8d051b12

  • SSDEEP

    1536:/FaB81LPCWhYZflrZVqXmUDuV+y3YaPe2uXvS+rG5r4Qzd1qA6cwgvIq/jMX5iQc:/FasRyfljumATwRkJwr7wA6c5/se

Malware Config

Extracted

Family

pony

C2

http://buyandsmile.atomclick.co:8080/pony/gate.php

http://dare2dreamz.com:8080/pony/gate.php

Attributes
  • payload_url

    http://staticbanner.adv.hu/pbLBReR.exe

    http://estebandiaz.com.ar/Tq1Fh9aM.exe

    http://giovanibenetti.com.br/P8nBC.exe

Targets

    • Target

      dc9265de9a7d4fb67226da9a73fbb009_JaffaCakes118

    • Size

      137KB

    • MD5

      dc9265de9a7d4fb67226da9a73fbb009

    • SHA1

      5d077c07c2bcda31e3f9d44f85cf07aac4be013a

    • SHA256

      708786ec9b2e3a8bd67d62177b4154a49d679bcde26587db69ddc3a4d64e03ef

    • SHA512

      700a28f3567d4501459e18e7a9a603995d1e7ee2b2d72f08e701bdcf5083edcbc9ad34bf4bcf163d4d8b1d5f2b6590db0d56555d59449ae8dba3bb8a8d051b12

    • SSDEEP

      1536:/FaB81LPCWhYZflrZVqXmUDuV+y3YaPe2uXvS+rG5r4Qzd1qA6cwgvIq/jMX5iQc:/FasRyfljumATwRkJwr7wA6c5/se

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks