General

  • Target

    eb3ef30274d4c79a70262596525c31be_JaffaCakes118

  • Size

    92KB

  • Sample

    240919-nnyfxswhqr

  • MD5

    eb3ef30274d4c79a70262596525c31be

  • SHA1

    8e6e29db27867d0acef9a46bae1d941bd4f281a7

  • SHA256

    264fc19ecb4f43400e7acca24727bd30ad57d7d337f9b0ef7af3e5df96cc4ee2

  • SHA512

    afbdc874ce8ddd53e8e73d1d06cf261a3c2d3d56522a5eeba1461e7d23dabfd5ce7ebcad7b3b1df9b1994eed0e5ba52514931b1e8cd1704a8e9fa42548850ecb

  • SSDEEP

    1536:iqCbITsmuCH1Tg1EKZN/gMv6Bh4aGyPy1ml00RSBVS+QVc6vZM27yon5W0KRM+6Y:iqFJnH1gN5zyPy1DWSBVvp6RDnY0KRMu

Malware Config

Extracted

Family

pony

C2

http://50.56.223.113:8080/pony/gate.php

http://91.121.178.156:8080/pony/gate.php

Attributes
  • payload_url

    http://lumarfotografia.com/L2LsHBJL/JDyFmCf.exe

    http://santacasaitajuba.com.br/WBoTANuY/hBhT7.exe

    http://elespacio.telmexla.net.co/sNxQTzEK/bHk6KE.exe

Targets

    • Target

      eb3ef30274d4c79a70262596525c31be_JaffaCakes118

    • Size

      92KB

    • MD5

      eb3ef30274d4c79a70262596525c31be

    • SHA1

      8e6e29db27867d0acef9a46bae1d941bd4f281a7

    • SHA256

      264fc19ecb4f43400e7acca24727bd30ad57d7d337f9b0ef7af3e5df96cc4ee2

    • SHA512

      afbdc874ce8ddd53e8e73d1d06cf261a3c2d3d56522a5eeba1461e7d23dabfd5ce7ebcad7b3b1df9b1994eed0e5ba52514931b1e8cd1704a8e9fa42548850ecb

    • SSDEEP

      1536:iqCbITsmuCH1Tg1EKZN/gMv6Bh4aGyPy1ml00RSBVS+QVc6vZM27yon5W0KRM+6Y:iqFJnH1gN5zyPy1DWSBVvp6RDnY0KRMu

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks