General

  • Target

    e97599efed9dee9ee799def7c312859e_JaffaCakes118

  • Size

    188KB

  • Sample

    240918-s8223aygqg

  • MD5

    e97599efed9dee9ee799def7c312859e

  • SHA1

    74f56065443e7189dfe79296daf03701048d13d4

  • SHA256

    12569226bfe513177530539a2bc7aaa64aac354db67bb7862bebb2671193d4a0

  • SHA512

    09f4f904b9f68dcfe197c1e9cb1961bc987b6c5686f3c0a7c7698192a8bd6f734aedaece902927675abcadcc7b572ddcbf6d5ce7bb3214dfce7b5e6303ee368c

  • SSDEEP

    3072:GRyTS+R5M0zKzivJXa9xMVPbt0cMDNIdEnr0H308Y:G8++R5z8Y1a7Kzt0cXdErEA

Malware Config

Extracted

Family

pony

C2

http://classicmodels.at:8080/ponys/gate.php

http://diva-code.at:8080/ponys/gate.php

Attributes
  • payload_url

    http://rentpaid.ca/5J0PySy2/Uzs4LGeo.exe

    http://waxsurfers.com/KrYtpYBC/a0Y.exe

    http://trongdanh.com.vn/gCYeq59G/sQMk.exe

Targets

    • Target

      e97599efed9dee9ee799def7c312859e_JaffaCakes118

    • Size

      188KB

    • MD5

      e97599efed9dee9ee799def7c312859e

    • SHA1

      74f56065443e7189dfe79296daf03701048d13d4

    • SHA256

      12569226bfe513177530539a2bc7aaa64aac354db67bb7862bebb2671193d4a0

    • SHA512

      09f4f904b9f68dcfe197c1e9cb1961bc987b6c5686f3c0a7c7698192a8bd6f734aedaece902927675abcadcc7b572ddcbf6d5ce7bb3214dfce7b5e6303ee368c

    • SSDEEP

      3072:GRyTS+R5M0zKzivJXa9xMVPbt0cMDNIdEnr0H308Y:G8++R5z8Y1a7Kzt0cXdErEA

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks