General

  • Target

    ec919d79a287416a61d0bb0585b2a430_JaffaCakes118

  • Size

    92KB

  • Sample

    240920-bvabfs1hjg

  • MD5

    ec919d79a287416a61d0bb0585b2a430

  • SHA1

    fd63d0781ffdeea80b37678e55508ca0adca9238

  • SHA256

    500e4ec8c2e23db363f561f12869fec76b8b8125cbbc53b9d69fe43e9668cba9

  • SHA512

    2418e68efece58342321c432255548f3599475d9e061c546d8267124cc1a47a9ed28a4aff0291062e50a3b73fd5d869b18b86f84e3925723660101d3ed0ca629

  • SSDEEP

    1536:0iBtwbia9GTRKHeYjtOHkbvNcyMqh23Us9HMM7XPhOsyMZzXlLrixqMUtbB5Aan0:0iEOEGT0HeSkIcy9h2rLXPQTWBLrvB50

Malware Config

Extracted

Family

pony

C2

http://infovega.lt:8080/pony/gate.php

http://subdatapro.com:8008/pony/gate.php

Attributes
  • payload_url

    http://www.eb3btz.com/72fTmEXk/w9ks9.exe

    http://ftp.imperiumit.com.br/gvoWhVVf/kmSdem1.exe

    http://lavanderiatingemais.com.br/F6EyS5D7/A5m.exe

Targets

    • Target

      ec919d79a287416a61d0bb0585b2a430_JaffaCakes118

    • Size

      92KB

    • MD5

      ec919d79a287416a61d0bb0585b2a430

    • SHA1

      fd63d0781ffdeea80b37678e55508ca0adca9238

    • SHA256

      500e4ec8c2e23db363f561f12869fec76b8b8125cbbc53b9d69fe43e9668cba9

    • SHA512

      2418e68efece58342321c432255548f3599475d9e061c546d8267124cc1a47a9ed28a4aff0291062e50a3b73fd5d869b18b86f84e3925723660101d3ed0ca629

    • SSDEEP

      1536:0iBtwbia9GTRKHeYjtOHkbvNcyMqh23Us9HMM7XPhOsyMZzXlLrixqMUtbB5Aan0:0iEOEGT0HeSkIcy9h2rLXPQTWBLrvB50

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks