General

  • Target

    a4cd64afedc8de755891fc67cdd3e450_JaffaCakes118

  • Size

    147KB

  • Sample

    241126-3x2x2awldz

  • MD5

    a4cd64afedc8de755891fc67cdd3e450

  • SHA1

    89ec229ef7d99fcf03cced78c23a19d1c34f7481

  • SHA256

    e98fe11be02aae1ce48a86a45d43b268e74c5f6b954a41f5a2b36464295f2157

  • SHA512

    2cff9ecaa5e7b7077bcaafe8fa33fd875ab1a9468c6ef5b867ea207405b1bff1ec125318c8f17a41b579e4e4ffe3e8112c9b1d21b4733be7bf5d694ede78dae9

  • SSDEEP

    3072:tnr3JGJRZ9oVeUYs0e3bCvwFSMbV5biSCFEGDT:tr3+Z9JsVhLbiSCeG3

Malware Config

Extracted

Family

pony

C2

http://66.151.138.87/forum/viewtopic.php

http://198.74.51.125/forum/viewtopic.php

Attributes
  • payload_url

    http://www.admirals.ae/bAYWzn5.exe

    http://ftp.selonic.de/iqXUWA.exe

    http://indosu.com/94rXrL.exe

Targets

    • Target

      a4cd64afedc8de755891fc67cdd3e450_JaffaCakes118

    • Size

      147KB

    • MD5

      a4cd64afedc8de755891fc67cdd3e450

    • SHA1

      89ec229ef7d99fcf03cced78c23a19d1c34f7481

    • SHA256

      e98fe11be02aae1ce48a86a45d43b268e74c5f6b954a41f5a2b36464295f2157

    • SHA512

      2cff9ecaa5e7b7077bcaafe8fa33fd875ab1a9468c6ef5b867ea207405b1bff1ec125318c8f17a41b579e4e4ffe3e8112c9b1d21b4733be7bf5d694ede78dae9

    • SSDEEP

      3072:tnr3JGJRZ9oVeUYs0e3bCvwFSMbV5biSCFEGDT:tr3+Z9JsVhLbiSCeG3

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks