General

  • Target

    a6fcc7c2fb3c5498d62626e6fefe4ab0_JaffaCakes118

  • Size

    94KB

  • Sample

    241127-kszb8swpgt

  • MD5

    a6fcc7c2fb3c5498d62626e6fefe4ab0

  • SHA1

    ed51b38ebb9c656664b0578fa587c5f38e8abfcd

  • SHA256

    e33f2c8f18c697ad5c20ae4eaf4daf1e695e40aed6fde416868b908db4e95ae4

  • SHA512

    543916f8bf0fc23c166fa0ce9dc12f02368f7a2c15ee630e346500842cf468d1e7c5242b69b7cb9562f88b4e8be392928f0e10b08cf126ddfa1c50518797ea13

  • SSDEEP

    1536:Zq7Ng88hoJrQCNH1an5f6wsMvjvC46uhwAd8zLfnQfaEWuXH7l60m:Zq7NgbhopTH1an5f6wXvj646KdkfRVqo

Malware Config

Extracted

Family

pony

C2

http://mtfksui.pw:4915/way/like.php

http://ghkeoud.pw:4915/way/like.php

Targets

    • Target

      a6fcc7c2fb3c5498d62626e6fefe4ab0_JaffaCakes118

    • Size

      94KB

    • MD5

      a6fcc7c2fb3c5498d62626e6fefe4ab0

    • SHA1

      ed51b38ebb9c656664b0578fa587c5f38e8abfcd

    • SHA256

      e33f2c8f18c697ad5c20ae4eaf4daf1e695e40aed6fde416868b908db4e95ae4

    • SHA512

      543916f8bf0fc23c166fa0ce9dc12f02368f7a2c15ee630e346500842cf468d1e7c5242b69b7cb9562f88b4e8be392928f0e10b08cf126ddfa1c50518797ea13

    • SSDEEP

      1536:Zq7Ng88hoJrQCNH1an5f6wsMvjvC46uhwAd8zLfnQfaEWuXH7l60m:Zq7NgbhopTH1an5f6wXvj646KdkfRVqo

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks