General

  • Target

    84ffd68fe79f6f2c710d40b3f1844e60_JaffaCakes118

  • Size

    95KB

  • Sample

    241102-mdsbgsscjg

  • MD5

    84ffd68fe79f6f2c710d40b3f1844e60

  • SHA1

    c890f607ac945691addddf6f04fb9963eb827829

  • SHA256

    2f57cc1c4ba03598669c22b4f3abc1d65d4ebf19e13239923d534574bc74df15

  • SHA512

    c1ab6233ce58d431313f1790cde0ee0cd4ae7ba82171894f91def0ddd65b1381a76d79032da24570a5ce492c0091f0d44aa0c81c103dbe71a00de0655143ff78

  • SSDEEP

    1536:4qfihnCypA8yUAUtwYsaw6qbKXK1A7OI+c8TFM8Eko7Rs0X0vRAs+vw11hoC:ohnZp7/Rtwh6qbK61Yd8TTEko7KNuRC

Malware Config

Extracted

Family

pony

C2

http://vkdlho.pw:4915/way/like.php

http://kldlry.pw:4915/way/like.php

Targets

    • Target

      84ffd68fe79f6f2c710d40b3f1844e60_JaffaCakes118

    • Size

      95KB

    • MD5

      84ffd68fe79f6f2c710d40b3f1844e60

    • SHA1

      c890f607ac945691addddf6f04fb9963eb827829

    • SHA256

      2f57cc1c4ba03598669c22b4f3abc1d65d4ebf19e13239923d534574bc74df15

    • SHA512

      c1ab6233ce58d431313f1790cde0ee0cd4ae7ba82171894f91def0ddd65b1381a76d79032da24570a5ce492c0091f0d44aa0c81c103dbe71a00de0655143ff78

    • SSDEEP

      1536:4qfihnCypA8yUAUtwYsaw6qbKXK1A7OI+c8TFM8Eko7Rs0X0vRAs+vw11hoC:ohnZp7/Rtwh6qbK61Yd8TTEko7KNuRC

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks