General

  • Target

    26a4d3d9c53141553c41470ddc5799e4_JaffaCakes118

  • Size

    128KB

  • Sample

    241008-2r96savflr

  • MD5

    26a4d3d9c53141553c41470ddc5799e4

  • SHA1

    5f2be0c5fef55d0cba6acc4b0e1f345cc39e1eeb

  • SHA256

    fcb734cd6a7c96a30d4d99a1b142a453c483cc753f8081b3d11ab4a07c070f4d

  • SHA512

    360074ada902ad48f83fff80f4de5f0e5fe0a69b65f6ac2195d986d54650588f92af549e91306b35ce6a251ddb86d10e511567b50e763469b81e03b9ccceb999

  • SSDEEP

    3072:fLv7moBSNHhdPZd2aYgeSjDvbJ4w5xDpaJIRD:jvW5hdhd27Wjjbl1ac

Malware Config

Extracted

Family

pony

C2

http://67.215.225.205:8080/forum/viewtopic.php

http://122.201.102.69:8080/forum/viewtopic.php

Attributes
  • payload_url

    http://cassieventos.com.br/kub6zQ.exe

    http://tiendaonline365.es/NHx7r.exe

    http://85.159.235.36/YVDFPCR.exe

Targets

    • Target

      26a4d3d9c53141553c41470ddc5799e4_JaffaCakes118

    • Size

      128KB

    • MD5

      26a4d3d9c53141553c41470ddc5799e4

    • SHA1

      5f2be0c5fef55d0cba6acc4b0e1f345cc39e1eeb

    • SHA256

      fcb734cd6a7c96a30d4d99a1b142a453c483cc753f8081b3d11ab4a07c070f4d

    • SHA512

      360074ada902ad48f83fff80f4de5f0e5fe0a69b65f6ac2195d986d54650588f92af549e91306b35ce6a251ddb86d10e511567b50e763469b81e03b9ccceb999

    • SSDEEP

      3072:fLv7moBSNHhdPZd2aYgeSjDvbJ4w5xDpaJIRD:jvW5hdhd27Wjjbl1ac

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks