General

  • Target

    89814ecbc984467f8260c88729f87a00_JaffaCakes118

  • Size

    107KB

  • Sample

    241103-eewfjathne

  • MD5

    89814ecbc984467f8260c88729f87a00

  • SHA1

    02051e42f097887753c6011d8b99bb10579eba5a

  • SHA256

    2a4ea8ceb4c981dee82b849bc7e10519cb2a146bf80ec2d25039b5b8cfd227d8

  • SHA512

    51a4d94e910086d95db727de7e3b5a1e4a40e1b62fe583e10ad808334797d47db9c65a32d8633a7f1aae1e89e202635a9ed6f0aeb4edc8050db5585cd9d4bd27

  • SSDEEP

    3072:NWa/Y1eOtYC8zBAcxrHyC8y3xYde+0oEhDTbkBys1k:FYRT8zBJLyzd70oEdT4E

Malware Config

Extracted

Family

pony

C2

http://91.121.84.204:8080/pony/gate.php

http://91.121.93.178:8080/pony/gate.php

Attributes
  • payload_url

    http://proyectoindio.org/7Qo.exe

    http://astronomika.com/493.exe

    http://amitysoft.com/mLTpZ4c.exe

Targets

    • Target

      89814ecbc984467f8260c88729f87a00_JaffaCakes118

    • Size

      107KB

    • MD5

      89814ecbc984467f8260c88729f87a00

    • SHA1

      02051e42f097887753c6011d8b99bb10579eba5a

    • SHA256

      2a4ea8ceb4c981dee82b849bc7e10519cb2a146bf80ec2d25039b5b8cfd227d8

    • SHA512

      51a4d94e910086d95db727de7e3b5a1e4a40e1b62fe583e10ad808334797d47db9c65a32d8633a7f1aae1e89e202635a9ed6f0aeb4edc8050db5585cd9d4bd27

    • SSDEEP

      3072:NWa/Y1eOtYC8zBAcxrHyC8y3xYde+0oEhDTbkBys1k:FYRT8zBJLyzd70oEdT4E

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks