General

  • Target

    a55e5f6161654f0fdbdb1687f63e5753_JaffaCakes118

  • Size

    91KB

  • Sample

    241127-cngbvs1pet

  • MD5

    a55e5f6161654f0fdbdb1687f63e5753

  • SHA1

    40f7bddac352b5e59bd6abe6cf4acd85a00899b5

  • SHA256

    a5829356656b00d6ba092422859eec8171c1d40d84630f7f2661643a9fc5c92c

  • SHA512

    a4d95b87540cd610bcbeedcbe18c80320ab03d2da083124f6d8d62c4c5d43d3b9d6a68f82393e27fcbb27a9291b11a15c65a3463e583dacc8f97dc1629977973

  • SSDEEP

    1536:9MlYx8d722f/BH7ECuQkKRfkkhFNnUBot/TCZn5p76zmKlYCn7KOpaYdfo7uPIbQ:9EAs2Y7EskKBkcXnCg7M5p7SmTcKIFoK

Malware Config

Extracted

Family

pony

C2

http://gooderix.info:9135/pic/fly.php

http://vooderax.info:9135/pic/fly.php

Targets

    • Target

      a55e5f6161654f0fdbdb1687f63e5753_JaffaCakes118

    • Size

      91KB

    • MD5

      a55e5f6161654f0fdbdb1687f63e5753

    • SHA1

      40f7bddac352b5e59bd6abe6cf4acd85a00899b5

    • SHA256

      a5829356656b00d6ba092422859eec8171c1d40d84630f7f2661643a9fc5c92c

    • SHA512

      a4d95b87540cd610bcbeedcbe18c80320ab03d2da083124f6d8d62c4c5d43d3b9d6a68f82393e27fcbb27a9291b11a15c65a3463e583dacc8f97dc1629977973

    • SSDEEP

      1536:9MlYx8d722f/BH7ECuQkKRfkkhFNnUBot/TCZn5p76zmKlYCn7KOpaYdfo7uPIbQ:9EAs2Y7EskKBkcXnCg7M5p7SmTcKIFoK

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks