General

  • Target

    ec3e7ddc27464facd28a3313aeebaec9_JaffaCakes118

  • Size

    84KB

  • Sample

    241213-s9y2ssvnan

  • MD5

    ec3e7ddc27464facd28a3313aeebaec9

  • SHA1

    7c6a643006a59d49a831c80b216f2cf1c421aced

  • SHA256

    5548cbc5406fb191e0546bd16df947404c9362a485bd9c143339c7ed175d6b03

  • SHA512

    1aead4c5a0ee62f1d59606133749a55002fec79c363cabf48d2eebc6d5a0e9fae836b59f2ad6f3adcf1c5924e18c7b80dca163aaa2ee1aec401a6d0032af48d2

  • SSDEEP

    1536:5ivb20K4j4MZcKDb6otPec3YvAMaHBv6V+un+yaP4nXUkNwh:MvSPk4oc6tPqaOn+yagXI

Malware Config

Extracted

Family

pony

C2

http://crytili.info:1654/ero.php

http://fypse2u.info:1654/ero.php

Targets

    • Target

      ec3e7ddc27464facd28a3313aeebaec9_JaffaCakes118

    • Size

      84KB

    • MD5

      ec3e7ddc27464facd28a3313aeebaec9

    • SHA1

      7c6a643006a59d49a831c80b216f2cf1c421aced

    • SHA256

      5548cbc5406fb191e0546bd16df947404c9362a485bd9c143339c7ed175d6b03

    • SHA512

      1aead4c5a0ee62f1d59606133749a55002fec79c363cabf48d2eebc6d5a0e9fae836b59f2ad6f3adcf1c5924e18c7b80dca163aaa2ee1aec401a6d0032af48d2

    • SSDEEP

      1536:5ivb20K4j4MZcKDb6otPec3YvAMaHBv6V+un+yaP4nXUkNwh:MvSPk4oc6tPqaOn+yagXI

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks