General

  • Target

    72d95ed1b06add12bbb240924635d1c8_JaffaCakes118

  • Size

    79KB

  • Sample

    241024-h66mcsycqf

  • MD5

    72d95ed1b06add12bbb240924635d1c8

  • SHA1

    b6b7ee4a97abe6c6a3a72ec2b32410ec155bc59a

  • SHA256

    c6cc0983b3604517dd73974096a13924e920cc1cc18eeda7b8eccdb1ad3d935e

  • SHA512

    5b8aa2eb74250b976ebc852dc3a12906858b7582bc0e056a877e89a1038e2a098e7fea3caa8faa031f841581ddf9508bbd9b0fd7517daf3555f1d59d886b321a

  • SSDEEP

    1536:gqQTLeKHhEyruj9eEruERQmt6GDE6LpVVyztxUt0e0H5CL:g7PThEyaeErXRFtTBVkrUtz0Hk

Malware Config

Extracted

Family

pony

C2

http://saliply.info:2346/pony/porno.php

http://gooryto.info:2346/pony/porno.php

Targets

    • Target

      72d95ed1b06add12bbb240924635d1c8_JaffaCakes118

    • Size

      79KB

    • MD5

      72d95ed1b06add12bbb240924635d1c8

    • SHA1

      b6b7ee4a97abe6c6a3a72ec2b32410ec155bc59a

    • SHA256

      c6cc0983b3604517dd73974096a13924e920cc1cc18eeda7b8eccdb1ad3d935e

    • SHA512

      5b8aa2eb74250b976ebc852dc3a12906858b7582bc0e056a877e89a1038e2a098e7fea3caa8faa031f841581ddf9508bbd9b0fd7517daf3555f1d59d886b321a

    • SSDEEP

      1536:gqQTLeKHhEyruj9eEruERQmt6GDE6LpVVyztxUt0e0H5CL:g7PThEyaeErXRFtTBVkrUtz0Hk

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks