General

  • Target

    eea95fdf77a56569c103a70ad817337a_JaffaCakes118

  • Size

    72KB

  • Sample

    241214-n7c94asqcm

  • MD5

    eea95fdf77a56569c103a70ad817337a

  • SHA1

    de6f9f42d1092e74363693867fe6b31fe8e4e977

  • SHA256

    46657329d21ce98eaa0d3815e6980d422771e0a34abedcfe3686819690d2be8a

  • SHA512

    c136115290d7dc4bec531db5090d52dacde3c80b8020a770c9714521ed449e62a0c081b7b499d905b10ad37fb72e3f4de889fed38aa941cd44caf636a5943351

  • SSDEEP

    1536:d5zq+5hRpfv+7IfRdUjOb+ep54PQv0xLVJfGdL3D+Dezvlbv:TfRdUjeB4YshudDYeBb

Malware Config

Extracted

Family

pony

C2

http://difoce.info:9135/pic/fly.php

http://jlessa.info:9135/pic/fly.php

Targets

    • Target

      eea95fdf77a56569c103a70ad817337a_JaffaCakes118

    • Size

      72KB

    • MD5

      eea95fdf77a56569c103a70ad817337a

    • SHA1

      de6f9f42d1092e74363693867fe6b31fe8e4e977

    • SHA256

      46657329d21ce98eaa0d3815e6980d422771e0a34abedcfe3686819690d2be8a

    • SHA512

      c136115290d7dc4bec531db5090d52dacde3c80b8020a770c9714521ed449e62a0c081b7b499d905b10ad37fb72e3f4de889fed38aa941cd44caf636a5943351

    • SSDEEP

      1536:d5zq+5hRpfv+7IfRdUjOb+ep54PQv0xLVJfGdL3D+Dezvlbv:TfRdUjeB4YshudDYeBb

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks