General

  • Target

    f95dd237f78cd4f00d9cad631772244c_JaffaCakes118

  • Size

    640KB

  • Sample

    240926-3zh8psvcjk

  • MD5

    f95dd237f78cd4f00d9cad631772244c

  • SHA1

    bc2da08a075f9c9b2d2b81dabd2af8d2eda181b7

  • SHA256

    8b2c21c13d38bbf20fd65e3a6b840315e14d60c0dc7e131104a5ea8b73699953

  • SHA512

    339273d3e4af7a83eb7a52b9aa8a43c7aafc5ab6f7d9632b102af2030b669e888b672233d4da543150974fe1e1afd89aa2863da20f8b9fa4bee872a85b5979f0

  • SSDEEP

    12288:CkhGT/f7DSvWN1JuigLYVlaf+dhKeVnVBAzzARX4g1z1MpTlu:CvzHSvi7AYaf+dk+gzGXj1zKtlu

Malware Config

Extracted

Family

pony

C2

http://193.239.147.165/office/gate.php

Attributes
  • payload_url

    http://193.239.147.165/office/shit.exe

Targets

    • Target

      f95dd237f78cd4f00d9cad631772244c_JaffaCakes118

    • Size

      640KB

    • MD5

      f95dd237f78cd4f00d9cad631772244c

    • SHA1

      bc2da08a075f9c9b2d2b81dabd2af8d2eda181b7

    • SHA256

      8b2c21c13d38bbf20fd65e3a6b840315e14d60c0dc7e131104a5ea8b73699953

    • SHA512

      339273d3e4af7a83eb7a52b9aa8a43c7aafc5ab6f7d9632b102af2030b669e888b672233d4da543150974fe1e1afd89aa2863da20f8b9fa4bee872a85b5979f0

    • SSDEEP

      12288:CkhGT/f7DSvWN1JuigLYVlaf+dhKeVnVBAzzARX4g1z1MpTlu:CvzHSvi7AYaf+dk+gzGXj1zKtlu

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks