General

  • Target

    eea7d623126ed7280032a614b8827529_JaffaCakes118

  • Size

    128KB

  • Sample

    240920-3l8lfavdmk

  • MD5

    eea7d623126ed7280032a614b8827529

  • SHA1

    7e0d7026754d10eb135fe8b1a11de01c77a994f0

  • SHA256

    e8abf644188abf25f5afdffc78d0d43ecaf5978b900f54ad6a5732a26705cdb7

  • SHA512

    77c646f80b9d98565f6e93fc8ff139ac38b30455e415898a439ec84b1527f1bd9e9f58dde1364ab87f7c21b3ea05bc2703454ab52131d53f81df2919d1229ffe

  • SSDEEP

    3072:uGHi6mwkZJ8iSUUdy2H+6KTwX6P7PTvhIcly:+7ZZSUUdy2OwXGTvj

Malware Config

Extracted

Family

pony

C2

http://67.215.225.205:8080/forum/viewtopic.php

http://69.194.193.134/forum/viewtopic.php

Attributes
  • payload_url

    http://fuerzav.vectorialstudios.com/4Gxf.exe

    http://riegotec.com.mx/fgGq.exe

    http://modaitaliaclub.com/LdKtM6.exe

    http://successwithmichael.com/Dj8vftG.exe

    http://piscinasangra.com/oP3yge.exe

    http://p933.phpnet.org/0uVk8W2Z.exe

Targets

    • Target

      eea7d623126ed7280032a614b8827529_JaffaCakes118

    • Size

      128KB

    • MD5

      eea7d623126ed7280032a614b8827529

    • SHA1

      7e0d7026754d10eb135fe8b1a11de01c77a994f0

    • SHA256

      e8abf644188abf25f5afdffc78d0d43ecaf5978b900f54ad6a5732a26705cdb7

    • SHA512

      77c646f80b9d98565f6e93fc8ff139ac38b30455e415898a439ec84b1527f1bd9e9f58dde1364ab87f7c21b3ea05bc2703454ab52131d53f81df2919d1229ffe

    • SSDEEP

      3072:uGHi6mwkZJ8iSUUdy2H+6KTwX6P7PTvhIcly:+7ZZSUUdy2OwXGTvj

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks