General

  • Target

    2f9e432d4ff23562f2395ecb626d2b6e_JaffaCakes118

  • Size

    84KB

  • Sample

    241009-mptcxsvfkb

  • MD5

    2f9e432d4ff23562f2395ecb626d2b6e

  • SHA1

    2a9961a3ae28b4c112c1ff1a7e208e6297f4e426

  • SHA256

    e83660b15a8fae159a2f3e8b39231950f956fa3679cdc68823d705a1b02e06c7

  • SHA512

    55da162210a922359279e8161e91230ad4ed7f36efc02a92bd600aa4f987e8dbc8295ff03e0f508becf4b3c5014c331cc0b14dde44a46081f49a2df2c3ac4c39

  • SSDEEP

    1536:9bgsoX3Itz6GmGo4hPhDW+wWupp0Haq5GsrYJUS5t1K+Um/+jBCkKj3ZEiAZ0Cxl:9u3MpDnhPhlupO6bsGUS5a+UM+1CkY3D

Malware Config

Extracted

Family

pony

C2

http://fypse2u.info:1654/ero.php

http://crytili.info:1654/ero.php

Targets

    • Target

      2f9e432d4ff23562f2395ecb626d2b6e_JaffaCakes118

    • Size

      84KB

    • MD5

      2f9e432d4ff23562f2395ecb626d2b6e

    • SHA1

      2a9961a3ae28b4c112c1ff1a7e208e6297f4e426

    • SHA256

      e83660b15a8fae159a2f3e8b39231950f956fa3679cdc68823d705a1b02e06c7

    • SHA512

      55da162210a922359279e8161e91230ad4ed7f36efc02a92bd600aa4f987e8dbc8295ff03e0f508becf4b3c5014c331cc0b14dde44a46081f49a2df2c3ac4c39

    • SSDEEP

      1536:9bgsoX3Itz6GmGo4hPhDW+wWupp0Haq5GsrYJUS5t1K+Um/+jBCkKj3ZEiAZ0Cxl:9u3MpDnhPhlupO6bsGUS5a+UM+1CkY3D

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks