General

  • Target

    88eab51b843ac202575706f582b509a0_JaffaCakes118

  • Size

    120KB

  • Sample

    241103-bntrhs1aqb

  • MD5

    88eab51b843ac202575706f582b509a0

  • SHA1

    12b1971bbb5d6600c16e20cadd182164e8a998e8

  • SHA256

    9bd5c9e59babc6145ee0a9e28fd49b2314bb88becac3dcb1c185848fafb56872

  • SHA512

    30150cd5cd92bea0bcded1c87057dbb5b9dbb60e6e1984244041f950993dd1643db939bad0f269c9324b55cdfb5b2d86c5a47459eeccc8845ec5aaf8b6c2bd36

  • SSDEEP

    1536:JRdXTvvcuZ2RXNr852RtHEmF2jbxWGq6ivtAvk:NDvvdZMa50kS2jbxWGqNvtAc

Malware Config

Extracted

Family

pony

C2

http://googleapis.com/gate.php

http://catch-cdn.com/gate.php

http://fbstatic-a.akamaihd.net/gate.php

http://l.yimg.com/gate.php

http://simple-cdn-node.com/gate.php

http://nym1.ib.adnxs.com/gate.php

http://cloud13.browser.ovi.com/gate.php

http://catch-cdn.com/1.exe?c=3

Attributes
  • payload_url

    http://catch-cdn.com/6.exe

Targets

    • Target

      88eab51b843ac202575706f582b509a0_JaffaCakes118

    • Size

      120KB

    • MD5

      88eab51b843ac202575706f582b509a0

    • SHA1

      12b1971bbb5d6600c16e20cadd182164e8a998e8

    • SHA256

      9bd5c9e59babc6145ee0a9e28fd49b2314bb88becac3dcb1c185848fafb56872

    • SHA512

      30150cd5cd92bea0bcded1c87057dbb5b9dbb60e6e1984244041f950993dd1643db939bad0f269c9324b55cdfb5b2d86c5a47459eeccc8845ec5aaf8b6c2bd36

    • SSDEEP

      1536:JRdXTvvcuZ2RXNr852RtHEmF2jbxWGq6ivtAvk:NDvvdZMa50kS2jbxWGqNvtAc

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks