General

  • Target

    f5b97488c2aca5934e7597e140631362_JaffaCakes118

  • Size

    128KB

  • Sample

    240925-lnf6ja1fkb

  • MD5

    f5b97488c2aca5934e7597e140631362

  • SHA1

    893d7446a0ea75fcb48de498282dd20f608e3259

  • SHA256

    abb52cb9c2aceb777ac11d137eda44cdcfb0bfba98d7653594b8ef6d963b3cb9

  • SHA512

    64c53513ae59aa6624e2f6ddbfff085ca69e09f4bdb263193ee169583e0759ead78c6cb97fc561c99c25f517b527c94ed8a3325874c2fdc1044daa81e3feb71d

  • SSDEEP

    3072:uGHi6mwlfjNHsXJNYxHWPKBV4ENNoDjrqVDAEmJI:+2fjOXJSxH54ENijrODAE

Malware Config

Extracted

Family

pony

C2

http://67.215.225.205:8080/ponys/gate.php

http://216.231.139.111/ponys/gate.php

Attributes
  • payload_url

    http://build-in.cz/CBopQ0TA/YD94an.exe

    http://heincountry.com/Lx38YeDG/PZ2AC.exe

    http://waxsurfers.com/KrYtpYBC/a0Y.exe

Targets

    • Target

      f5b97488c2aca5934e7597e140631362_JaffaCakes118

    • Size

      128KB

    • MD5

      f5b97488c2aca5934e7597e140631362

    • SHA1

      893d7446a0ea75fcb48de498282dd20f608e3259

    • SHA256

      abb52cb9c2aceb777ac11d137eda44cdcfb0bfba98d7653594b8ef6d963b3cb9

    • SHA512

      64c53513ae59aa6624e2f6ddbfff085ca69e09f4bdb263193ee169583e0759ead78c6cb97fc561c99c25f517b527c94ed8a3325874c2fdc1044daa81e3feb71d

    • SSDEEP

      3072:uGHi6mwlfjNHsXJNYxHWPKBV4ENNoDjrqVDAEmJI:+2fjOXJSxH54ENijrODAE

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks