General

  • Target

    8c4f8b00f938257dec978b251a502e8b_JaffaCakes118

  • Size

    59KB

  • Sample

    241103-thx6vsxhpb

  • MD5

    8c4f8b00f938257dec978b251a502e8b

  • SHA1

    9f8e513554c331657f52c520648fa29183aa98c5

  • SHA256

    af78a8289d0e1c53faadb980ee2a957f6fa001dad9b34ac9d2df9162534aa116

  • SHA512

    b4f14ea22abb6ef3de021e7b8a88a2d86a5afef18dacff181be0ddec074ab2f46acfcf647b1c92d0da74238dd6d1c60c3c21434c242435d92c8099314860f075

  • SSDEEP

    1536:B4P1LMokzq+5hRpfv+7Iis8RcEW3dpNYLcq5LlY5E5e73A+IdWbNagwc:B4P14Bis8uh3XNYLcqsCejA+IdyND

Malware Config

Extracted

Family

pony

C2

http://hesdoc.info:9135/pic/fly.php

Targets

    • Target

      8c4f8b00f938257dec978b251a502e8b_JaffaCakes118

    • Size

      59KB

    • MD5

      8c4f8b00f938257dec978b251a502e8b

    • SHA1

      9f8e513554c331657f52c520648fa29183aa98c5

    • SHA256

      af78a8289d0e1c53faadb980ee2a957f6fa001dad9b34ac9d2df9162534aa116

    • SHA512

      b4f14ea22abb6ef3de021e7b8a88a2d86a5afef18dacff181be0ddec074ab2f46acfcf647b1c92d0da74238dd6d1c60c3c21434c242435d92c8099314860f075

    • SSDEEP

      1536:B4P1LMokzq+5hRpfv+7Iis8RcEW3dpNYLcq5LlY5E5e73A+IdWbNagwc:B4P14Bis8uh3XNYLcqsCejA+IdyND

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks