General

  • Target

    ee56702443fe7d6fe4fab874b6f3f3b9_JaffaCakes118

  • Size

    81KB

  • Sample

    240920-ywyrrswamm

  • MD5

    ee56702443fe7d6fe4fab874b6f3f3b9

  • SHA1

    8383651a5642facfced1eafa8246ae2cdeee462c

  • SHA256

    12dcf7add4b5758f321f2b471fdcaea0e3faacace6981a689bab90cf8d84ed76

  • SHA512

    5d2567170c2ec5c6570b8e901a47b3bc4851d3db0b09003516f136d4ac4abef19defa53027f50aa40df0baee2872854ee1c6cb51fda4a5e1a1fcccfb20def2a4

  • SSDEEP

    1536:Cf1mb6zZJMVsZYLYmDmGUKGvEVes+nm5odBkHRbl/xz:CwWHYGvEcncHpl/xz

Malware Config

Extracted

Family

pony

C2

http://ponystat.in/ts/old.php

Attributes
  • payload_url

    http://genalo.in/3.exe

Targets

    • Target

      ee56702443fe7d6fe4fab874b6f3f3b9_JaffaCakes118

    • Size

      81KB

    • MD5

      ee56702443fe7d6fe4fab874b6f3f3b9

    • SHA1

      8383651a5642facfced1eafa8246ae2cdeee462c

    • SHA256

      12dcf7add4b5758f321f2b471fdcaea0e3faacace6981a689bab90cf8d84ed76

    • SHA512

      5d2567170c2ec5c6570b8e901a47b3bc4851d3db0b09003516f136d4ac4abef19defa53027f50aa40df0baee2872854ee1c6cb51fda4a5e1a1fcccfb20def2a4

    • SSDEEP

      1536:Cf1mb6zZJMVsZYLYmDmGUKGvEVes+nm5odBkHRbl/xz:CwWHYGvEcncHpl/xz

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks