General

  • Target

    65175742b1e57f79d1571576ff558450_JaffaCakes118

  • Size

    99KB

  • Sample

    241021-by7fcssaqf

  • MD5

    65175742b1e57f79d1571576ff558450

  • SHA1

    d349937f5fd123b12409365f683cd4d3bf991ea4

  • SHA256

    0d09538093de366004e4b0cebdcd9df339ff979b8526ed18362c5b54be3c9c2b

  • SHA512

    097c5251f98d420a554d515f921eb059fbd2bd9528337e67278e33230b71c0cdbc143b043cffa06aaf39d9faf9d4950165e3cf37ca70b1211be16ca720a72c40

  • SSDEEP

    1536:rftxMMbaI9DtPHPLZp5+VPLQ/jOxgBsCwW83DtskDSHwFmrVpN8bo/haaf4T:rlxMu9Dtb4P1xlVW83JMXN8bo/c84T

Malware Config

Extracted

Family

pony

C2

http://ffgolsak.info:4915/way/like.php

http://skholsry.info:4915/way/like.php

Targets

    • Target

      65175742b1e57f79d1571576ff558450_JaffaCakes118

    • Size

      99KB

    • MD5

      65175742b1e57f79d1571576ff558450

    • SHA1

      d349937f5fd123b12409365f683cd4d3bf991ea4

    • SHA256

      0d09538093de366004e4b0cebdcd9df339ff979b8526ed18362c5b54be3c9c2b

    • SHA512

      097c5251f98d420a554d515f921eb059fbd2bd9528337e67278e33230b71c0cdbc143b043cffa06aaf39d9faf9d4950165e3cf37ca70b1211be16ca720a72c40

    • SSDEEP

      1536:rftxMMbaI9DtPHPLZp5+VPLQ/jOxgBsCwW83DtskDSHwFmrVpN8bo/haaf4T:rlxMu9Dtb4P1xlVW83JMXN8bo/c84T

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks