General

  • Target

    de3b681b9cf1047bb6db1827c577d7e4_JaffaCakes118

  • Size

    689KB

  • Sample

    240913-m46a2ayemj

  • MD5

    de3b681b9cf1047bb6db1827c577d7e4

  • SHA1

    80842e3ce9b3c723bbf2a1703655d8caade1b9c7

  • SHA256

    12769d1632b1aae509facab57435dd9507e799318611a8645dd7be55a1c4fa1b

  • SHA512

    0fd715babedb98cad416b7a15bb7670d23f5def44af03548c4d95645a292984969938bfa6873c2945ddbd0b222ad78c0f059653e7c8f6a6766033a619e59ca7a

  • SSDEEP

    3072:rPUoL/+FWAgUZkAOpx7ScjdfDdYPy3jwAbnnOHcZMc7g1hDdCljM8DfH5TC:rjL/Ag/A0RJf1sAbn1Zh7YsjRDRT

Malware Config

Extracted

Family

pony

C2

http://engage.lv/.htac/tmp/fafa/gate.php

Targets

    • Target

      de3b681b9cf1047bb6db1827c577d7e4_JaffaCakes118

    • Size

      689KB

    • MD5

      de3b681b9cf1047bb6db1827c577d7e4

    • SHA1

      80842e3ce9b3c723bbf2a1703655d8caade1b9c7

    • SHA256

      12769d1632b1aae509facab57435dd9507e799318611a8645dd7be55a1c4fa1b

    • SHA512

      0fd715babedb98cad416b7a15bb7670d23f5def44af03548c4d95645a292984969938bfa6873c2945ddbd0b222ad78c0f059653e7c8f6a6766033a619e59ca7a

    • SSDEEP

      3072:rPUoL/+FWAgUZkAOpx7ScjdfDdYPy3jwAbnnOHcZMc7g1hDdCljM8DfH5TC:rjL/Ag/A0RJf1sAbn1Zh7YsjRDRT

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks