General

  • Target

    6b3c1ad6f58f8b1da2035ad831c7c6b5_JaffaCakes118

  • Size

    76KB

  • Sample

    241022-tqthmstekg

  • MD5

    6b3c1ad6f58f8b1da2035ad831c7c6b5

  • SHA1

    28d97dd065f71745c9f2012845b9f3e46935d432

  • SHA256

    c2ce98fab7e39904c910f165b18cb814995cf540c3d02fac1c62e73a11ed96fe

  • SHA512

    8258f99e9939ca622bcdf1923a7963ec2572fd25b4d44b48457edad44e6af83ef64e9242cabf440e9094037f1640d3aa24547829bbe3e3cbbf4d886101abda53

  • SSDEEP

    1536:cuGikLXtzq+5hRpfv+7IeL3JOozHWoXGX1JOTqZ8JGkRTpnQwgnmXr4CS1seR:chikLXJeL37zHBXmETtJD3xb4/

Malware Config

Extracted

Family

pony

C2

http://vidasly.info:9135/pic/fly.php

http://nukasex.info:9135/pic/fly.php

Targets

    • Target

      6b3c1ad6f58f8b1da2035ad831c7c6b5_JaffaCakes118

    • Size

      76KB

    • MD5

      6b3c1ad6f58f8b1da2035ad831c7c6b5

    • SHA1

      28d97dd065f71745c9f2012845b9f3e46935d432

    • SHA256

      c2ce98fab7e39904c910f165b18cb814995cf540c3d02fac1c62e73a11ed96fe

    • SHA512

      8258f99e9939ca622bcdf1923a7963ec2572fd25b4d44b48457edad44e6af83ef64e9242cabf440e9094037f1640d3aa24547829bbe3e3cbbf4d886101abda53

    • SSDEEP

      1536:cuGikLXtzq+5hRpfv+7IeL3JOozHWoXGX1JOTqZ8JGkRTpnQwgnmXr4CS1seR:chikLXJeL37zHBXmETtJD3xb4/

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks