General

  • Target

    4b4c5ca78ac7150cae44591974ccff75_JaffaCakes118

  • Size

    143KB

  • Sample

    241016-eg214a1fne

  • MD5

    4b4c5ca78ac7150cae44591974ccff75

  • SHA1

    23e2f8304514f9f3e3d144482560858822193256

  • SHA256

    b7eff66a6a7ebf6d019bdfdd61211309097648307fe488eecbda3d432d92d9d0

  • SHA512

    786dad4283970877ec5b5f5875e80e4ec3ceb389d2f14fb95c2c44bc2cfe299366f8fc8799b6690d0a5112139b1b92bba87723fadb7e9caf3bff66ec558cc8d2

  • SSDEEP

    3072:XjlKZelTDhbaBA5ZjjYrx0Z01FAbZ3eAIplpaJgnGPeg9:JwelMBAvjjY9JbAb0naePy

Malware Config

Extracted

Family

pony

C2

http://66.55.89.150:8080/forum/viewtopic.php

http://66.55.89.151:8080/forum/viewtopic.php

Attributes
  • payload_url

    http://boletin.puntoimpresion.com/Qnrnh53B.exe

    http://www.vivaidiportanova.it/55V7.exe

    http://www.urbyagri.es/s56k5.exe

    http://etradi.webgenshop.nl/xWP.exe

Targets

    • Target

      4b4c5ca78ac7150cae44591974ccff75_JaffaCakes118

    • Size

      143KB

    • MD5

      4b4c5ca78ac7150cae44591974ccff75

    • SHA1

      23e2f8304514f9f3e3d144482560858822193256

    • SHA256

      b7eff66a6a7ebf6d019bdfdd61211309097648307fe488eecbda3d432d92d9d0

    • SHA512

      786dad4283970877ec5b5f5875e80e4ec3ceb389d2f14fb95c2c44bc2cfe299366f8fc8799b6690d0a5112139b1b92bba87723fadb7e9caf3bff66ec558cc8d2

    • SSDEEP

      3072:XjlKZelTDhbaBA5ZjjYrx0Z01FAbZ3eAIplpaJgnGPeg9:JwelMBAvjjY9JbAb0naePy

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks