General

  • Target

    7dc2f7ec95b2437f6bbacda1d52d802d_JaffaCakes118

  • Size

    143KB

  • Sample

    241030-d75z1awarf

  • MD5

    7dc2f7ec95b2437f6bbacda1d52d802d

  • SHA1

    c30ff818b15200fbc30caba9b58e291c92936eda

  • SHA256

    e34afd657e8520a8171e0f1a3e827c4d195293492844a9943793055fed556bf3

  • SHA512

    e8cc6cadde84cd8e10b2e6741cf727f75659502678a9e1550bcbf3ac31b55c0c6384af3aac8a19bb9ff37d8fba5edaed3095357b90902c9fcd084294e6f28352

  • SSDEEP

    3072:XjlKZelTDmEXN9QkZNGOXkTdCtLfbuCQpZNepaJbbZpk:JwelVN91NGekTgLbSMahFp

Malware Config

Extracted

Family

pony

C2

http://66.55.89.150:8080/forum/viewtopic.php

http://66.55.89.151:8080/forum/viewtopic.php

Attributes
  • payload_url

    http://aainstalacoeseletricas.com.br/fFp8mz1.exe

    http://guvenoptik.com/hbGB.exe

    http://bostonfunctions.com/aVH.exe

Targets

    • Target

      7dc2f7ec95b2437f6bbacda1d52d802d_JaffaCakes118

    • Size

      143KB

    • MD5

      7dc2f7ec95b2437f6bbacda1d52d802d

    • SHA1

      c30ff818b15200fbc30caba9b58e291c92936eda

    • SHA256

      e34afd657e8520a8171e0f1a3e827c4d195293492844a9943793055fed556bf3

    • SHA512

      e8cc6cadde84cd8e10b2e6741cf727f75659502678a9e1550bcbf3ac31b55c0c6384af3aac8a19bb9ff37d8fba5edaed3095357b90902c9fcd084294e6f28352

    • SSDEEP

      3072:XjlKZelTDmEXN9QkZNGOXkTdCtLfbuCQpZNepaJbbZpk:JwelVN91NGekTgLbSMahFp

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks