General

  • Target

    18d0fdc8476b81c5eebaf868be817f01_JaffaCakes118

  • Size

    127KB

  • Sample

    241006-ts28katblp

  • MD5

    18d0fdc8476b81c5eebaf868be817f01

  • SHA1

    0c338ede600ca901c5ab2cf5f1d9430a04a37dd8

  • SHA256

    e4cd49d7df4856466784517f7228961c536a87f8b1b5217f121f78ef99e27b5b

  • SHA512

    05021ff4b4469664cfa47bb65567600f1e02bd162cbc0d11d5de0c730f04a7de2882df76ea511ddffab1ba886020af78515c55a66c79573463b80bceb74b3318

  • SSDEEP

    3072:1g1PZv5LLLLLLLL555vbbPZrrXZLrrrrAWmFuMBMCjwJKq0dGAu3ygch:e1PZv5LLLLLLLL555vbbPZrrXZLrrrrc

Malware Config

Extracted

Family

pony

C2

http://149.255.99.32:8080/forum/viewtopic.php

http://69.163.40.128/forum/viewtopic.php

Attributes
  • payload_url

    http://birdofparadisepub.com/poQYPP.exe

    http://www.carddebtgone.com/NW6.exe

    http://capital-marketing.me/yqMb.exe

Targets

    • Target

      18d0fdc8476b81c5eebaf868be817f01_JaffaCakes118

    • Size

      127KB

    • MD5

      18d0fdc8476b81c5eebaf868be817f01

    • SHA1

      0c338ede600ca901c5ab2cf5f1d9430a04a37dd8

    • SHA256

      e4cd49d7df4856466784517f7228961c536a87f8b1b5217f121f78ef99e27b5b

    • SHA512

      05021ff4b4469664cfa47bb65567600f1e02bd162cbc0d11d5de0c730f04a7de2882df76ea511ddffab1ba886020af78515c55a66c79573463b80bceb74b3318

    • SSDEEP

      3072:1g1PZv5LLLLLLLL555vbbPZrrXZLrrrrAWmFuMBMCjwJKq0dGAu3ygch:e1PZv5LLLLLLLL555vbbPZrrXZLrrrrc

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks