General

  • Target

    63ebf64aea416da73b78c128bd0de978_JaffaCakes118

  • Size

    65KB

  • Sample

    241020-x8hqmsxhnk

  • MD5

    63ebf64aea416da73b78c128bd0de978

  • SHA1

    25cfb9cbbad8a3415b800973c430f61e45f0e6c0

  • SHA256

    0178e0072fa6bd34a21af2edf4182deb0e3df20b11b9a31794da6cf98d5a5de0

  • SHA512

    e07b0beac0743da6e9d8b28acb860d7795a4ac2b56108d41ac5f7c40097829472f4fd6503a313ff94e95216bca3b4affa4fe2d21e2a98d61c29c65a8ab336117

  • SSDEEP

    1536:elB1zq+5hRpfvE7IxEos7PcF+KPmfRuUf/cDJUw9n6ns+jdzAqjq4yvGp:ezxEVPA+qmfR5CJUxs+SQeGp

Malware Config

Extracted

Family

pony

C2

http://jarkiy.info:2346/porno.php

http://sulikg.info:2346/porno.php

Targets

    • Target

      63ebf64aea416da73b78c128bd0de978_JaffaCakes118

    • Size

      65KB

    • MD5

      63ebf64aea416da73b78c128bd0de978

    • SHA1

      25cfb9cbbad8a3415b800973c430f61e45f0e6c0

    • SHA256

      0178e0072fa6bd34a21af2edf4182deb0e3df20b11b9a31794da6cf98d5a5de0

    • SHA512

      e07b0beac0743da6e9d8b28acb860d7795a4ac2b56108d41ac5f7c40097829472f4fd6503a313ff94e95216bca3b4affa4fe2d21e2a98d61c29c65a8ab336117

    • SSDEEP

      1536:elB1zq+5hRpfvE7IxEos7PcF+KPmfRuUf/cDJUw9n6ns+jdzAqjq4yvGp:ezxEVPA+qmfR5CJUxs+SQeGp

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks