General

  • Target

    a3619d717b55ec6dafa76651417b33a5_JaffaCakes118

  • Size

    619KB

  • Sample

    241126-wsl8fsyqen

  • MD5

    a3619d717b55ec6dafa76651417b33a5

  • SHA1

    13067d1188bb4c5c3b3ddef2a0f7e31e58377423

  • SHA256

    8a33bef866f9b088bd2f232b073bc28ca4452edc191adc1b35d377d9ff4aac27

  • SHA512

    a874b7b856b60aaacb1d86ad0b777a3089faefd17b9bdb23df62ef99be261909070d5d954a13699fc854f0ae2c5e37a98083247211a782b3b28046dc47d49431

  • SSDEEP

    12288:RbbohK0LdmJDTjO1tjWx8zChMbey+esTCmQ3v:RIsXx/O1tjWOCh7D2mQ/

Malware Config

Extracted

Family

pony

C2

http://relacer.rajas.com.my/gate.php

Attributes
  • payload_url

    http://relacer.rajas.com.my/shit.exe

Targets

    • Target

      a3619d717b55ec6dafa76651417b33a5_JaffaCakes118

    • Size

      619KB

    • MD5

      a3619d717b55ec6dafa76651417b33a5

    • SHA1

      13067d1188bb4c5c3b3ddef2a0f7e31e58377423

    • SHA256

      8a33bef866f9b088bd2f232b073bc28ca4452edc191adc1b35d377d9ff4aac27

    • SHA512

      a874b7b856b60aaacb1d86ad0b777a3089faefd17b9bdb23df62ef99be261909070d5d954a13699fc854f0ae2c5e37a98083247211a782b3b28046dc47d49431

    • SSDEEP

      12288:RbbohK0LdmJDTjO1tjWx8zChMbey+esTCmQ3v:RIsXx/O1tjWOCh7D2mQ/

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks