General

  • Target

    eed15524d792231857eddc3b31bdd990_JaffaCakes118

  • Size

    89KB

  • Sample

    240921-bxvp6sygml

  • MD5

    eed15524d792231857eddc3b31bdd990

  • SHA1

    87c338bf9035c8df2dcb44c5aa71df5867474edb

  • SHA256

    d63bb647e53855baf6c0104fd7319e96f8ce80542b2ad98f514003522ac9a861

  • SHA512

    67a8edd6bfe2ec3aa390a571029386309d80cac8a914877510a321fdc7c0006d7324432b91789cb6789d5ed91160ee454d046e018077dcef5c4231d3df435fb8

  • SSDEEP

    1536:wBy3ePwUPqTB285AFouyRZeuWT7uSdfxg4OXMhBTvTEI2kzZH:+y1UXeuyRUuWXPbOXsJEIZH

Malware Config

Extracted

Family

pony

C2

http://br1.irontrial.com:8080/ponyb/gate.php

http://br1.pineapplesdonthavesleeves.com:8080/ponyb/gate.php

http://89.166.50.40:8080/ponyb/gate.php

http://6.magicalomaha.com/ponyb/gate.php

Attributes
  • payload_url

    http://gleeclub.bplaced.net/eHeSq.exe

    http://mybuss.com.mx/bvpVa0E.exe

    http://blazingindustrial.net/eKcV.exe

    http://khioffices.com/T4Li.exe

Targets

    • Target

      eed15524d792231857eddc3b31bdd990_JaffaCakes118

    • Size

      89KB

    • MD5

      eed15524d792231857eddc3b31bdd990

    • SHA1

      87c338bf9035c8df2dcb44c5aa71df5867474edb

    • SHA256

      d63bb647e53855baf6c0104fd7319e96f8ce80542b2ad98f514003522ac9a861

    • SHA512

      67a8edd6bfe2ec3aa390a571029386309d80cac8a914877510a321fdc7c0006d7324432b91789cb6789d5ed91160ee454d046e018077dcef5c4231d3df435fb8

    • SSDEEP

      1536:wBy3ePwUPqTB285AFouyRZeuWT7uSdfxg4OXMhBTvTEI2kzZH:+y1UXeuyRUuWXPbOXsJEIZH

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks