General

  • Target

    46f02ad9a522b2335cfba9ab188eb604_JaffaCakes118

  • Size

    126KB

  • Sample

    241015-k6f3tazern

  • MD5

    46f02ad9a522b2335cfba9ab188eb604

  • SHA1

    a327929e6b950e8cc8d93fa496b75a7451088262

  • SHA256

    d9daac92f2918737514d47ab295ef06788e0543cec72cbc9d7266ff5c487f834

  • SHA512

    93b3d07d245c1d34774d8737c72374a19164669a8adb5ea48d1b8a73c6e3f2ccb87dbefd007eb3df3a069dd9fc3a834527bc4fde7c3eb7149b636bae2241b377

  • SSDEEP

    3072:W1hyoJnDFn/Wr9rz0ya+HCeWR/X/qPpKRcZOkeMOMW:WTbnzaiLRXZQOkFq

Malware Config

Extracted

Family

pony

C2

http://84.22.106.99/vbulletin/profile.php

Attributes
  • payload_url

    http://johnsonrose.ca/sohoadmin/config/flsh.exe

Targets

    • Target

      pdf_trkRW184018395CA.scr

    • Size

      184KB

    • MD5

      17f79adb21b0cec082466ef5c08d38da

    • SHA1

      0d8c269c847331295cdabed69582252fbff42d0e

    • SHA256

      923e6bc32c344882732d92f753ebf21701eaad45ca8effb03f5d13ccc3fe9b1c

    • SHA512

      2f4b5601025e476dd042bea0b01a33aebe4cf0b39417635905d785aac7901dca46a5446c6cb79af0a449726bff3af5fde910dfc3ae466b45df0320f67e522133

    • SSDEEP

      3072:LOVIaiMMJouOkSe65Ozp8q+aL8X63OaggY9:LOd5MJXjp8qTIX63gx

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks