General

  • Target

    ab7757c7e52a44d863ed1eb6ff668df4_JaffaCakes118

  • Size

    92KB

  • Sample

    241128-h6s19szmhz

  • MD5

    ab7757c7e52a44d863ed1eb6ff668df4

  • SHA1

    73ba9d9eae8ed68f6da5d78649420e16d0ddaeb8

  • SHA256

    067c4e20d2a072a01e4e90239c1b6dd04525db2cfc2d71f08bcbd25132f61165

  • SHA512

    25ff617bcff4b1c03d842a35525b374bb0f98b5ebdb79b74cbca4220d869c7475c45b09776909ae574b2230de73121ce5e23de0f5ed0b25ea4c417adc876ff97

  • SSDEEP

    1536:t383ip+GqgeHQuvhEIuxTnTZZcM0ih40PcX+Fh+qs8YZioTdNKzARHk333P9s4+g:t383nwuOIuNnNZcM0j+w8hoqY691P

Malware Config

Extracted

Family

pony

C2

http://difoce.info:9135/pic/fly.php

http://jlessa.info:9135/pic/fly.php

Targets

    • Target

      ab7757c7e52a44d863ed1eb6ff668df4_JaffaCakes118

    • Size

      92KB

    • MD5

      ab7757c7e52a44d863ed1eb6ff668df4

    • SHA1

      73ba9d9eae8ed68f6da5d78649420e16d0ddaeb8

    • SHA256

      067c4e20d2a072a01e4e90239c1b6dd04525db2cfc2d71f08bcbd25132f61165

    • SHA512

      25ff617bcff4b1c03d842a35525b374bb0f98b5ebdb79b74cbca4220d869c7475c45b09776909ae574b2230de73121ce5e23de0f5ed0b25ea4c417adc876ff97

    • SSDEEP

      1536:t383ip+GqgeHQuvhEIuxTnTZZcM0ih40PcX+Fh+qs8YZioTdNKzARHk333P9s4+g:t383nwuOIuNnNZcM0j+w8hoqY691P

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks