General

  • Target

    c9cf79ec0ef4988ddaffa0c0c7210bc0_JaffaCakes118

  • Size

    95KB

  • Sample

    241205-21587awqdw

  • MD5

    c9cf79ec0ef4988ddaffa0c0c7210bc0

  • SHA1

    af1699c53ce79777b9c5d58997791386cdfccf95

  • SHA256

    0d7a08ff03bfef0c73cd3d6f1da08d3ba8789402bfe8d1be8d3aa2147f9456a8

  • SHA512

    7fd5dc685c3fe1533ecb369e258ea2521767b59badee1290ed93d48a16bba70b7996683d5aa7173e95f6511ea7fbcf394b7035ccedf02bb44c8d3a00404b867e

  • SSDEEP

    1536:dQgH+YYetqmpNGLsmYTQsaPiFFvrQwoQy0l47XQcWZes6Xl2Kk+A:bvzYYnQ3OEwoBR66I

Malware Config

Extracted

Family

pony

C2

http://mgirrdu.pw:4915/way/like.php

http://jtryliy.pw:4915/way/like.php

Targets

    • Target

      c9cf79ec0ef4988ddaffa0c0c7210bc0_JaffaCakes118

    • Size

      95KB

    • MD5

      c9cf79ec0ef4988ddaffa0c0c7210bc0

    • SHA1

      af1699c53ce79777b9c5d58997791386cdfccf95

    • SHA256

      0d7a08ff03bfef0c73cd3d6f1da08d3ba8789402bfe8d1be8d3aa2147f9456a8

    • SHA512

      7fd5dc685c3fe1533ecb369e258ea2521767b59badee1290ed93d48a16bba70b7996683d5aa7173e95f6511ea7fbcf394b7035ccedf02bb44c8d3a00404b867e

    • SSDEEP

      1536:dQgH+YYetqmpNGLsmYTQsaPiFFvrQwoQy0l47XQcWZes6Xl2Kk+A:bvzYYnQ3OEwoBR66I

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks