General

  • Target

    ec52479b6627522a77c5614f6dd77b29_JaffaCakes118

  • Size

    188KB

  • Sample

    241213-tl2cpatmcy

  • MD5

    ec52479b6627522a77c5614f6dd77b29

  • SHA1

    ff7923cf055585cabe72cb59427af23022a63dc9

  • SHA256

    6f395dd70414e891caf703e510fef3b250873578c0995a88f586bb0fcc296d9c

  • SHA512

    a9e8aee4f4b0a7ca795211a1f167236644cebf0743615040d18fb57ab381f5dc7fbcf7ce5af869e8c0d2f067f04f5608e0b44ccc9c44b2a35ad0710c4aee07af

  • SSDEEP

    3072:Vvep7nmwfvrmQzySsaeYd2rVnEfVtLc1QjtjtuWGWBUUr:M8UMSsXY8nEt9cETEs

Malware Config

Extracted

Family

pony

C2

http://13.carnovirious.net/ponyd/gate.php

http://13.JONEMNOMINIK.NET/ponyd/gate.php

http://13.LOMERDASTER.NET/ponyd/gate.php

http://13.ZABAKARVESTER.NET/ponyd/gate.php

Attributes
  • payload_url

    http://www.absolution.hu/1SeHj.exe

    http://exectechgroup.com/krwZW95g.exe

    http://www1.boonstra-verswaren.nl/PXh.exe

    http://ambiance-warande.nl/e8UjnpYn.exe

    http://www.rh-industrie.de/aEP2.exe

    http://167611.webhosting65.1blu.de/Gr4.exe

Targets

    • Target

      ec52479b6627522a77c5614f6dd77b29_JaffaCakes118

    • Size

      188KB

    • MD5

      ec52479b6627522a77c5614f6dd77b29

    • SHA1

      ff7923cf055585cabe72cb59427af23022a63dc9

    • SHA256

      6f395dd70414e891caf703e510fef3b250873578c0995a88f586bb0fcc296d9c

    • SHA512

      a9e8aee4f4b0a7ca795211a1f167236644cebf0743615040d18fb57ab381f5dc7fbcf7ce5af869e8c0d2f067f04f5608e0b44ccc9c44b2a35ad0710c4aee07af

    • SSDEEP

      3072:Vvep7nmwfvrmQzySsaeYd2rVnEfVtLc1QjtjtuWGWBUUr:M8UMSsXY8nEt9cETEs

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks