General

  • Target

    fc0fa0b7624d5374e84aaba4162f3f9d_JaffaCakes118

  • Size

    152KB

  • Sample

    240928-l4bkzsscqa

  • MD5

    fc0fa0b7624d5374e84aaba4162f3f9d

  • SHA1

    c57959363d580cb1903e82d611969a1215affbed

  • SHA256

    24a8608bfa422151907d01612fdf1594cc1a4ae01ec021de7ade768e7fa006bf

  • SHA512

    4ef0bf3eb63b4bc941c6e604d3122e9a7c08c99e9907b8329b2f4316d30c6b0691efc98c49f33c1755626123eb480f21e1bc139f3837c77f8bedca0583cdc70d

  • SSDEEP

    1536:yoBN8LsIOzA7QR3M6MlhnovrenUXRTcbXGWWcqtHHz0wOzYFXs+EtpxDA5PEzJND:d8VO5ObvoKzG04IwvQ+5stNLekEfW

Malware Config

Extracted

Family

pony

C2

http://198.143.159.103/pony/gate.php

http://69.194.196.35/pony/gate.php

Attributes
  • payload_url

    http://www.christinkupfernagel.de/1y2S32.exe

    http://veltzinc.com/H1V5R.exe

    http://jayapipes.com/7m9Dw.exe

    http://topseoz.co.uk/ED3HTN.exe

    http://salonlaantigua.com/s8oHx8.exe

    http://ftp.doctorhahn.com/LE7piZy.exe

Targets

    • Target

      fc0fa0b7624d5374e84aaba4162f3f9d_JaffaCakes118

    • Size

      152KB

    • MD5

      fc0fa0b7624d5374e84aaba4162f3f9d

    • SHA1

      c57959363d580cb1903e82d611969a1215affbed

    • SHA256

      24a8608bfa422151907d01612fdf1594cc1a4ae01ec021de7ade768e7fa006bf

    • SHA512

      4ef0bf3eb63b4bc941c6e604d3122e9a7c08c99e9907b8329b2f4316d30c6b0691efc98c49f33c1755626123eb480f21e1bc139f3837c77f8bedca0583cdc70d

    • SSDEEP

      1536:yoBN8LsIOzA7QR3M6MlhnovrenUXRTcbXGWWcqtHHz0wOzYFXs+EtpxDA5PEzJND:d8VO5ObvoKzG04IwvQ+5stNLekEfW

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks