General

  • Target

    063257b9115aa24060a36e910203f14d_JaffaCakes118

  • Size

    40KB

  • Sample

    241001-rsf9zstfrk

  • MD5

    063257b9115aa24060a36e910203f14d

  • SHA1

    5fc4f49abe3c7cf524de2de58dd7088a22d42a75

  • SHA256

    45aeb03a12c0b47c24582e9033e3aa81daf05ce5f6938041cf2ddcf01d559198

  • SHA512

    83281de6fcdfb1136d21ee848cfbed43fb9c9850bc5950e1bab9e6ca9328a30ffd64eba413b310b91fcf86dc7d11e77856d0870d9031728715a93318c157d9d2

  • SSDEEP

    768:/L9ij6QGZcowu5InOI3LQ/19XwVK5V2UddZbXwclHKm5Jy+44s4Nn0Gx1Zl8wH6E:/YmFabtnOIs/1CwPt5sclh5J7ZyGbZ7

Malware Config

Extracted

Family

pony

C2

http://trueyogateacherblog.com/resp.php

http://rrshaw.com/resp.php

Targets

    • Target

      igo-android-320x480.exe

    • Size

      103KB

    • MD5

      1107aad3f09e426d35b73dd82acd7d0d

    • SHA1

      f5284fc60ece7e690a462ed6e4606a23c82d6bd1

    • SHA256

      6cb06b8d0588df1e2a6f5888fcbcffb901de4bbbe9ccb37ed060ecda99ea9633

    • SHA512

      030c85075d7a9107172f92494ad9cf89e3105253a9ec3c9c8c9198185c3adfff99818787889473b57a42a8c4b025ddee656073dcd8f1cc67ea6f0ac7926e647f

    • SSDEEP

      768:SH5NNNNNNNNbNNNNNNNNbNNNNNNNNbNNNNNNNNbNNNNNNNNbNNNNNNNNbNNNNNN1:G0jLKpUpVOkz7e/dEWXt

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks