General

  • Target

    66a2a5c2e4de25af79e740c8781940db_JaffaCakes118

  • Size

    84KB

  • Sample

    241021-ny5yrasfkc

  • MD5

    66a2a5c2e4de25af79e740c8781940db

  • SHA1

    e2f2bf8d2c0f4909b9273adcf89d3029f4486f85

  • SHA256

    202a83b60dfa6cb71f69af74817d5d18152682edd657081ac46fddfbc7666b7d

  • SHA512

    bdd685411e28bebdd84a210024a839333763347df631df7b373d2b45eabef226f1f883818163dc517b56b6b6c84fe46e7064dc6a9f9d5b52d8827b5ca030fd65

  • SSDEEP

    1536:CaJUOLywb7+pb6AXbIjqpQqiWqbTkvpJnEJXgC9S2xoKTxfxrZCb+msL1C3LDU05:FRxaZUeQqJRJniQCQ2KGFZHZS/

Malware Config

Extracted

Family

pony

C2

http://fypse2u.info:1654/ero.php

http://crytili.info:1654/ero.php

Targets

    • Target

      66a2a5c2e4de25af79e740c8781940db_JaffaCakes118

    • Size

      84KB

    • MD5

      66a2a5c2e4de25af79e740c8781940db

    • SHA1

      e2f2bf8d2c0f4909b9273adcf89d3029f4486f85

    • SHA256

      202a83b60dfa6cb71f69af74817d5d18152682edd657081ac46fddfbc7666b7d

    • SHA512

      bdd685411e28bebdd84a210024a839333763347df631df7b373d2b45eabef226f1f883818163dc517b56b6b6c84fe46e7064dc6a9f9d5b52d8827b5ca030fd65

    • SSDEEP

      1536:CaJUOLywb7+pb6AXbIjqpQqiWqbTkvpJnEJXgC9S2xoKTxfxrZCb+msL1C3LDU05:FRxaZUeQqJRJniQCQ2KGFZHZS/

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks