General

  • Target

    6aa0801db426aceb10e26d6c2a562e24_JaffaCakes118

  • Size

    92KB

  • Sample

    241022-qgh4rswgnd

  • MD5

    6aa0801db426aceb10e26d6c2a562e24

  • SHA1

    222e369308b64428dcb31e79a95233086dbcde8f

  • SHA256

    95c9f45876c5930a78df1666538516fd3d6d36f3c53b6eb5b255185a442ae978

  • SHA512

    9cfb98a6aa58c25ed75821fe6517537a8eacc05f05e5c32a2223fd2e3b327cd6b7d04daea13b24db5c1708c2d6ca3a83501eaf16549e374f179d4c3c01feaf23

  • SSDEEP

    1536:tHWygif+fGvYj9a8qcWX/4BEdLoFftMrJeFvQAR+LESqzFHCfqb:tsifmGvYUhrcuFeZzRMN8Cfqb

Malware Config

Extracted

Family

pony

C2

http://132.248.49.112:8080/asp/intro.php

http://113.130.65.77:8080/asp/intro.php

http://203.113.98.131:8080/asp/intro.php

http://110.164.58.250:8080/asp/intro.php

http://200.108.18.158:8080/asp/intro.php

http://207.182.144.115:8080/asp/intro.php

http://148.208.216.70:8080/asp/intro.php

http://203.172.252.26:8080/asp/intro.php

http://202.6.120.103:8080/asp/intro.php

http://203.146.208.180:8080/asp/intro.php

http://207.126.57.208:8080/asp/intro.php

http://203.80.16.81:8080/asp/intro.php

http://202.180.221.186:8080/asp/intro.php

Targets

    • Target

      6aa0801db426aceb10e26d6c2a562e24_JaffaCakes118

    • Size

      92KB

    • MD5

      6aa0801db426aceb10e26d6c2a562e24

    • SHA1

      222e369308b64428dcb31e79a95233086dbcde8f

    • SHA256

      95c9f45876c5930a78df1666538516fd3d6d36f3c53b6eb5b255185a442ae978

    • SHA512

      9cfb98a6aa58c25ed75821fe6517537a8eacc05f05e5c32a2223fd2e3b327cd6b7d04daea13b24db5c1708c2d6ca3a83501eaf16549e374f179d4c3c01feaf23

    • SSDEEP

      1536:tHWygif+fGvYj9a8qcWX/4BEdLoFftMrJeFvQAR+LESqzFHCfqb:tsifmGvYUhrcuFeZzRMN8Cfqb

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks