General

  • Target

    e5f86587cda928f64d131656479a4bbc_JaffaCakes118

  • Size

    126KB

  • Sample

    241212-ml89zatkhj

  • MD5

    e5f86587cda928f64d131656479a4bbc

  • SHA1

    067e54f2e5c209b76f3a1a0118ee36907c6ef09f

  • SHA256

    d953d5ee17203bc877887f277c7bd4f52607c2da5331cd567e07d7e6e8802574

  • SHA512

    9d8896a79bc98ac66a2844deb776580c4b67f7754afa763bb7c59d7e75666a5fd98fcc53171a213fb122672760f0ec8a86039f9269941f6cebdea14595bb831a

  • SSDEEP

    3072:9Lb25qPuYayC39wJHIh84uvR/vYPmRauJiOeMxIC9KP:9Lb25q2zyA+JH7v11RtJG8c

Malware Config

Extracted

Family

pony

C2

http://91.220.35.125/internet_gas.php

http://188.93.235.254/5101fcf84/vsdfb45wret

http://188.93.235.254/5101fcf84/43ggewvefbwerg

http://91.220.35.48/fb/internet.php

Targets

    • Target

      e5f86587cda928f64d131656479a4bbc_JaffaCakes118

    • Size

      126KB

    • MD5

      e5f86587cda928f64d131656479a4bbc

    • SHA1

      067e54f2e5c209b76f3a1a0118ee36907c6ef09f

    • SHA256

      d953d5ee17203bc877887f277c7bd4f52607c2da5331cd567e07d7e6e8802574

    • SHA512

      9d8896a79bc98ac66a2844deb776580c4b67f7754afa763bb7c59d7e75666a5fd98fcc53171a213fb122672760f0ec8a86039f9269941f6cebdea14595bb831a

    • SSDEEP

      3072:9Lb25qPuYayC39wJHIh84uvR/vYPmRauJiOeMxIC9KP:9Lb25q2zyA+JH7v11RtJG8c

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks