General

  • Target

    c7f3e02fa347d8fd6c90a9d2e9727ba0_JaffaCakes118

  • Size

    99KB

  • Sample

    241205-qwk7nssphp

  • MD5

    c7f3e02fa347d8fd6c90a9d2e9727ba0

  • SHA1

    8df96ef88f94918fb24dfffb9ac459b399b612fd

  • SHA256

    41e5e2d1c20987ceef0a7f3c62309855798dda6a99666509382a94b5ffd452c1

  • SHA512

    758df5cc952d401923c68497fc802dcf45c45ee982315c126445995dde2a48595984ca108ed5d3778b6984948e43bc3dc2a00fafb6d49a631042c05e3cbd3b98

  • SSDEEP

    1536:AD8+2MMbaI9DtPsCwW83DtTiDSHwFOrVpN8bo/haafBhPLZp5+qPLQ/jOxg:+8fMu9DtUVW83kcXN8bo/c8HDP1x

Malware Config

Extracted

Family

pony

C2

http://ffgolsak.info:4915/way/like.php

http://skholsry.info:4915/way/like.php

Targets

    • Target

      c7f3e02fa347d8fd6c90a9d2e9727ba0_JaffaCakes118

    • Size

      99KB

    • MD5

      c7f3e02fa347d8fd6c90a9d2e9727ba0

    • SHA1

      8df96ef88f94918fb24dfffb9ac459b399b612fd

    • SHA256

      41e5e2d1c20987ceef0a7f3c62309855798dda6a99666509382a94b5ffd452c1

    • SHA512

      758df5cc952d401923c68497fc802dcf45c45ee982315c126445995dde2a48595984ca108ed5d3778b6984948e43bc3dc2a00fafb6d49a631042c05e3cbd3b98

    • SSDEEP

      1536:AD8+2MMbaI9DtPsCwW83DtTiDSHwFOrVpN8bo/haafBhPLZp5+qPLQ/jOxg:+8fMu9DtUVW83kcXN8bo/c8HDP1x

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks