General

  • Target

    14efff3aa3c6c111a95835070456fcf2_JaffaCakes118

  • Size

    92KB

  • Sample

    241004-z2y56a1dlh

  • MD5

    14efff3aa3c6c111a95835070456fcf2

  • SHA1

    dfaf8421c0cb90db7c352f5f44b22d49e042db73

  • SHA256

    eb41fa56f4e8bad48752209d9c5550800e0c3a9d070e4d51ed4e7d164f4675b7

  • SHA512

    3e50cd35bd6fd8f9b31b24cd6ca24eeb40f75663ed969d5f8c6408746c05c2c0021319a77d9148056a4ad6b0faa3bbd843b3c078b7fd86a050b73d42c6ed98b6

  • SSDEEP

    1536:b7CWiuswxKWcTXpf5jW383jEa9Y6gzv/wAuRmGwYiyAL:aWiudQpT5f5jW38zEaHgzv/wAug5gA

Malware Config

Extracted

Family

pony

C2

http://publichelper.in:8080/z.php?ftp=1

http://helphimnow.in:8080/z.php?ftp=1

Targets

    • Target

      14efff3aa3c6c111a95835070456fcf2_JaffaCakes118

    • Size

      92KB

    • MD5

      14efff3aa3c6c111a95835070456fcf2

    • SHA1

      dfaf8421c0cb90db7c352f5f44b22d49e042db73

    • SHA256

      eb41fa56f4e8bad48752209d9c5550800e0c3a9d070e4d51ed4e7d164f4675b7

    • SHA512

      3e50cd35bd6fd8f9b31b24cd6ca24eeb40f75663ed969d5f8c6408746c05c2c0021319a77d9148056a4ad6b0faa3bbd843b3c078b7fd86a050b73d42c6ed98b6

    • SSDEEP

      1536:b7CWiuswxKWcTXpf5jW383jEa9Y6gzv/wAuRmGwYiyAL:aWiudQpT5f5jW38zEaHgzv/wAug5gA

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks