General

  • Target

    0d787fc23c4ddd46b9dc14285b2af19b_JaffaCakes118

  • Size

    84KB

  • Sample

    241003-ctaq9szcnq

  • MD5

    0d787fc23c4ddd46b9dc14285b2af19b

  • SHA1

    f490f460608d1756ded0dd3c1ec822ee9b4a9a84

  • SHA256

    f3dc568481640ceae893490cd59dc9cfaf2d0b9ec6166229a805903934b3e2e6

  • SHA512

    3c30d6d2d24753b70a9fa14a71546e8fec096aef278d5fb6fd3c05e46b0b6be47fc8a85c37a05b12b7c53bdc476ab997f54ff1a585a183081b86d548f79c2687

  • SSDEEP

    1536:4dSW3HA5crLH6FIBLIQ/wWBWzbt7mG9UbyugPM4rHGzoW074KMHcuV:feHUcrLaFIBkQoW4/t7mfPGZGdATPu

Malware Config

Extracted

Family

pony

C2

http://crytili.info:1654/ero.php

http://fypse2u.info:1654/ero.php

Targets

    • Target

      0d787fc23c4ddd46b9dc14285b2af19b_JaffaCakes118

    • Size

      84KB

    • MD5

      0d787fc23c4ddd46b9dc14285b2af19b

    • SHA1

      f490f460608d1756ded0dd3c1ec822ee9b4a9a84

    • SHA256

      f3dc568481640ceae893490cd59dc9cfaf2d0b9ec6166229a805903934b3e2e6

    • SHA512

      3c30d6d2d24753b70a9fa14a71546e8fec096aef278d5fb6fd3c05e46b0b6be47fc8a85c37a05b12b7c53bdc476ab997f54ff1a585a183081b86d548f79c2687

    • SSDEEP

      1536:4dSW3HA5crLH6FIBLIQ/wWBWzbt7mG9UbyugPM4rHGzoW074KMHcuV:feHUcrLaFIBkQoW4/t7mfPGZGdATPu

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks