General

  • Target

    646d6a6cbf5299eb86d0177667103f78_JaffaCakes118

  • Size

    84KB

  • Sample

    241020-2lc9vsvajd

  • MD5

    646d6a6cbf5299eb86d0177667103f78

  • SHA1

    c9807e61e3765e91ce2762ab9bc23240ffd01272

  • SHA256

    762c6b8f33d7ae388f15770105aa44fc49ea3e8c930d7d7dbfff6800ab3ceeed

  • SHA512

    362e3eec80dd86ed54744ef983243a39431da43482fff06c6ca7e04d31ce0a7eb46b877c0f64ada85d2d76de93fd4c07cc79db8e96deabed5fb9306ab2853326

  • SSDEEP

    1536:haJUOLywb7+pb699rQeSiAa7TkGpJeOZJuagC9+20zaB5fotZvb+msLAT3YDc0:uRxa8ZSziJeOLcCQ2osdSwkyX

Malware Config

Extracted

Family

pony

C2

http://fypse2u.info:1654/ero.php

http://crytili.info:1654/ero.php

Targets

    • Target

      646d6a6cbf5299eb86d0177667103f78_JaffaCakes118

    • Size

      84KB

    • MD5

      646d6a6cbf5299eb86d0177667103f78

    • SHA1

      c9807e61e3765e91ce2762ab9bc23240ffd01272

    • SHA256

      762c6b8f33d7ae388f15770105aa44fc49ea3e8c930d7d7dbfff6800ab3ceeed

    • SHA512

      362e3eec80dd86ed54744ef983243a39431da43482fff06c6ca7e04d31ce0a7eb46b877c0f64ada85d2d76de93fd4c07cc79db8e96deabed5fb9306ab2853326

    • SSDEEP

      1536:haJUOLywb7+pb699rQeSiAa7TkGpJeOZJuagC9+20zaB5fotZvb+msLAT3YDc0:uRxa8ZSziJeOLcCQ2osdSwkyX

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks