General

  • Target

    ad2fcb47cc9475dea9ec123fbfdd3927_JaffaCakes118

  • Size

    84KB

  • Sample

    241128-wxk6yswjas

  • MD5

    ad2fcb47cc9475dea9ec123fbfdd3927

  • SHA1

    04a1d0321d16b764f18753177e70d228c2083d0d

  • SHA256

    add9965929bc3198edf1a08dbe2253f24672d47bfcf2fac574fae19374fb2cce

  • SHA512

    c2e1674bcfbb21d481f94686c0533e04f89310f743108138805f5ea5d56e7900b9f4fbbeb70e74c99c5cf0297db214c360045e770c9315740ed474c99a3f0a75

  • SSDEEP

    1536:surTR4UUbBBHFZnT1m/taX2Q7SBByelm5s0nrneZhmoyaOeWQDhSJ5Mz8I5702NF:BeUUVcAdu/1Y7e3KaOteSG54YYF

Malware Config

Extracted

Family

pony

C2

http://fypse2u.info:1654/ero.php

http://crytili.info:1654/ero.php

Targets

    • Target

      ad2fcb47cc9475dea9ec123fbfdd3927_JaffaCakes118

    • Size

      84KB

    • MD5

      ad2fcb47cc9475dea9ec123fbfdd3927

    • SHA1

      04a1d0321d16b764f18753177e70d228c2083d0d

    • SHA256

      add9965929bc3198edf1a08dbe2253f24672d47bfcf2fac574fae19374fb2cce

    • SHA512

      c2e1674bcfbb21d481f94686c0533e04f89310f743108138805f5ea5d56e7900b9f4fbbeb70e74c99c5cf0297db214c360045e770c9315740ed474c99a3f0a75

    • SSDEEP

      1536:surTR4UUbBBHFZnT1m/taX2Q7SBByelm5s0nrneZhmoyaOeWQDhSJ5Mz8I5702NF:BeUUVcAdu/1Y7e3KaOteSG54YYF

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks