General

  • Target

    b90f4cc811b26e15caef2e46c74759d7_JaffaCakes118

  • Size

    144KB

  • Sample

    241202-tldavs1nbv

  • MD5

    b90f4cc811b26e15caef2e46c74759d7

  • SHA1

    5176b7114b004cd1510f29ff010882fa7049d2c2

  • SHA256

    a775c5197b2d7059d97d632a984959f2aeb0096cc52e6de93d77e910b092361e

  • SHA512

    31e9961d318cb26379259c6a18951cf29b182f7ee69a0e5b2764d78a30c6d1460539b0feba395f6d7aaaec199ee9867dd09e0783cb7a850b4e862257a5dc29e4

  • SSDEEP

    3072:0jlKZelTDA8nVtbZGjm+2nasj3bx+FK07fpaJUU:4welzVttGjmBbbbe3ay

Malware Config

Extracted

Family

pony

C2

http://66.55.89.150:8080/forum/viewtopic.php

http://66.55.89.151:8080/forum/viewtopic.php

Attributes
  • payload_url

    http://www.ncga.org/toK.exe

    http://biju.crt.bg/geyj.exe

    http://web.techart.cz/R8wnJrWU.exe

Targets

    • Target

      b90f4cc811b26e15caef2e46c74759d7_JaffaCakes118

    • Size

      144KB

    • MD5

      b90f4cc811b26e15caef2e46c74759d7

    • SHA1

      5176b7114b004cd1510f29ff010882fa7049d2c2

    • SHA256

      a775c5197b2d7059d97d632a984959f2aeb0096cc52e6de93d77e910b092361e

    • SHA512

      31e9961d318cb26379259c6a18951cf29b182f7ee69a0e5b2764d78a30c6d1460539b0feba395f6d7aaaec199ee9867dd09e0783cb7a850b4e862257a5dc29e4

    • SSDEEP

      3072:0jlKZelTDA8nVtbZGjm+2nasj3bx+FK07fpaJUU:4welzVttGjmBbbbe3ay

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks