General

  • Target

    dd1c39ed237e057e68a1009aa13e2798_JaffaCakes118

  • Size

    140KB

  • Sample

    241210-fmadpsvjaw

  • MD5

    dd1c39ed237e057e68a1009aa13e2798

  • SHA1

    8f80b711d47738c3b72ec8aff7a699b77064e7a6

  • SHA256

    023eeff68a937880c4b38a60506322d6e47390ffdf05be7ddfa908bc2b6c5ea2

  • SHA512

    fd9be9bb6d211a9e374210a61d7863f74a0357af43f58c5c9ea2aa675847047789aee3eeef822859ba8dda4f41c1b40cbb4f4a5e2f3fd5c66a886bff2b465e7e

  • SSDEEP

    3072:Nr+9jaF5bKXEIK5KGRwGAG6TQWrPppppZppppppppppQppppppppZppppppppppu:T5bNIJGRTAnTQMPppppZppppppppppQk

Malware Config

Extracted

Family

pony

C2

http://8.axellelemaire.org/forum/viewtopic.php

http://8.cafesexcelentes.com/forum/viewtopic.php

Attributes
  • payload_url

    http://Voyagersystems.cc/EcYdbYWf.exe

    http://marketer-school.net/xFMTvTNP.exe

Targets

    • Target

      dd1c39ed237e057e68a1009aa13e2798_JaffaCakes118

    • Size

      140KB

    • MD5

      dd1c39ed237e057e68a1009aa13e2798

    • SHA1

      8f80b711d47738c3b72ec8aff7a699b77064e7a6

    • SHA256

      023eeff68a937880c4b38a60506322d6e47390ffdf05be7ddfa908bc2b6c5ea2

    • SHA512

      fd9be9bb6d211a9e374210a61d7863f74a0357af43f58c5c9ea2aa675847047789aee3eeef822859ba8dda4f41c1b40cbb4f4a5e2f3fd5c66a886bff2b465e7e

    • SSDEEP

      3072:Nr+9jaF5bKXEIK5KGRwGAG6TQWrPppppZppppppppppQppppppppZppppppppppu:T5bNIJGRTAnTQMPppppZppppppppppQk

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks