General

  • Target

    0bae2c967626b7f0ecc0167ca44e6f5b_JaffaCakes118

  • Size

    144KB

  • Sample

    241002-vhwhpsxcqm

  • MD5

    0bae2c967626b7f0ecc0167ca44e6f5b

  • SHA1

    a7ef708ece8bac961097595d93ad478ec0464f52

  • SHA256

    79d3c9950cd5ffb0ec0f2d619c7b5315cf0ce902647ceb351e2a9483cbc055b2

  • SHA512

    e11d3443476332cabf47e0ab9ec76189ef12664eac86b715ba295e5bfcd3aaa5b78162df4348b9537e00c94a5e412ecaa247c9aba0941334d4b073de436a215e

  • SSDEEP

    3072:s0IYwk7xA1rHbSnCZYoB1rLAxgutQb0HdUyY6CpaJFsZLoYHYd:nIYwkdMSn8YoLLVrbwzuaj2rH0

Malware Config

Extracted

Family

pony

C2

http://74.53.97.66:8080/forum/viewtopic.php

http://74.53.97.67:8080/forum/viewtopic.php

Attributes
  • payload_url

    http://orion.obidigital.net/d09ZhGf.exe

    http://ftp.lastraautosport.com.ar/xjH.exe

Targets

    • Target

      0bae2c967626b7f0ecc0167ca44e6f5b_JaffaCakes118

    • Size

      144KB

    • MD5

      0bae2c967626b7f0ecc0167ca44e6f5b

    • SHA1

      a7ef708ece8bac961097595d93ad478ec0464f52

    • SHA256

      79d3c9950cd5ffb0ec0f2d619c7b5315cf0ce902647ceb351e2a9483cbc055b2

    • SHA512

      e11d3443476332cabf47e0ab9ec76189ef12664eac86b715ba295e5bfcd3aaa5b78162df4348b9537e00c94a5e412ecaa247c9aba0941334d4b073de436a215e

    • SSDEEP

      3072:s0IYwk7xA1rHbSnCZYoB1rLAxgutQb0HdUyY6CpaJFsZLoYHYd:nIYwkdMSn8YoLLVrbwzuaj2rH0

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks