General

  • Target

    453278bee1b4bfe72138c6044bbcf23f_JaffaCakes118

  • Size

    154KB

  • Sample

    241015-b3pq4s1fkq

  • MD5

    453278bee1b4bfe72138c6044bbcf23f

  • SHA1

    d4e5335e8cbad169106e4e9e5d4e859ca8ca8ee9

  • SHA256

    d4bc694a11254770b77ce0976ca448447d6e8021443f0cb663acf121e127d350

  • SHA512

    e5f93427ee66108b594d9fc3f82b13d6a35665f8419cd6144c77613899a22d8e617e0002b6d4f205bb2edda0730735c5ff80fae1709272ed68fa9f0dc8205df2

  • SSDEEP

    1536:f/o/7SLadLfk+qB6PKIlFB3OaIA4boRSCsV63DMo74vWXsT2Mi4U+JzARAtJQwE7:8dLfLqB63/4NtbiJNT5V6k+JURGDK9

Malware Config

Extracted

Family

pony

C2

http://213.155.112.85:8080/forum/viewtopic.php

http://97.74.197.122:8080/forum/viewtopic.php

Attributes
  • payload_url

    http://elenaspina.com/1iYU.exe

    http://hytasb.com/95f9H7J8.exe

    http://www.BANTAABIDAR.COM/C6Y1Dy.exe

Targets

    • Target

      453278bee1b4bfe72138c6044bbcf23f_JaffaCakes118

    • Size

      154KB

    • MD5

      453278bee1b4bfe72138c6044bbcf23f

    • SHA1

      d4e5335e8cbad169106e4e9e5d4e859ca8ca8ee9

    • SHA256

      d4bc694a11254770b77ce0976ca448447d6e8021443f0cb663acf121e127d350

    • SHA512

      e5f93427ee66108b594d9fc3f82b13d6a35665f8419cd6144c77613899a22d8e617e0002b6d4f205bb2edda0730735c5ff80fae1709272ed68fa9f0dc8205df2

    • SSDEEP

      1536:f/o/7SLadLfk+qB6PKIlFB3OaIA4boRSCsV63DMo74vWXsT2Mi4U+JzARAtJQwE7:8dLfLqB63/4NtbiJNT5V6k+JURGDK9

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks