General

  • Target

    f9bb4ca8c22f4c0c63cb1c95e08f9496_JaffaCakes118

  • Size

    147KB

  • Sample

    240927-fc14nswanq

  • MD5

    f9bb4ca8c22f4c0c63cb1c95e08f9496

  • SHA1

    eb2ece19537c56e18a1a3345ff09f2daa8e4d5ab

  • SHA256

    2654a239ecb9798db314df2a52b05a5f556faf65d52a716533ecf33ea856e19f

  • SHA512

    bf8ac9ec867b3e807ea702d16ddaad9c7ddbd71a91061e9f0b37a1f674f781b95803351c1446eec7515b63900a107f86e04f0eb11fb70fe74f3e2c7c5aee1cc5

  • SSDEEP

    3072:z5Rfr1ZZpFhVpnEpGXIvDbKfn4YO6P6morL3Atm3TJ4Dl:z5tr5BVFENbbKfTHtm3TJ4D

Malware Config

Extracted

Family

pony

C2

http://sam-latrilogie.com:8080/pony/gate.php

http://loceanic.fr:8080/pony/gate.php

Attributes
  • payload_url

    http://propasmanagement.com/qTNc.exe

    http://toffanoseventos.com.br/EFcT.exe

    http://www.graficasalli.com.br/AqnAaH.exe

Targets

    • Target

      f9bb4ca8c22f4c0c63cb1c95e08f9496_JaffaCakes118

    • Size

      147KB

    • MD5

      f9bb4ca8c22f4c0c63cb1c95e08f9496

    • SHA1

      eb2ece19537c56e18a1a3345ff09f2daa8e4d5ab

    • SHA256

      2654a239ecb9798db314df2a52b05a5f556faf65d52a716533ecf33ea856e19f

    • SHA512

      bf8ac9ec867b3e807ea702d16ddaad9c7ddbd71a91061e9f0b37a1f674f781b95803351c1446eec7515b63900a107f86e04f0eb11fb70fe74f3e2c7c5aee1cc5

    • SSDEEP

      3072:z5Rfr1ZZpFhVpnEpGXIvDbKfn4YO6P6morL3Atm3TJ4Dl:z5tr5BVFENbbKfTHtm3TJ4D

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks