General

  • Target

    ef32ace0a9564c845503cdcaef6192a1_JaffaCakes118

  • Size

    97KB

  • Sample

    241214-rqlrpawpgn

  • MD5

    ef32ace0a9564c845503cdcaef6192a1

  • SHA1

    a730a4a38fa6c4a1c5b42aa3dbfc91e5f169b172

  • SHA256

    ecdb1d03ac1ff9d87ae8ee41f58f995ef91d7baa6ff5c73db398442341a74940

  • SHA512

    ebf9164a8a0c6aa2edfa17a8f4ce62835e75fdae84f22c22d326b38e83bec53e0df91cc887d0d436704741792c85ba4168b3566ab76e935a475e111d6be2acc8

  • SSDEEP

    3072:OXvuD2BTruA85DUn8/TdHUsXwD+mjY1P4:OX2iuxw8bwymjv

Malware Config

Extracted

Family

pony

C2

http://hesdoc.info:9135/pic/fly.php

Targets

    • Target

      ef32ace0a9564c845503cdcaef6192a1_JaffaCakes118

    • Size

      97KB

    • MD5

      ef32ace0a9564c845503cdcaef6192a1

    • SHA1

      a730a4a38fa6c4a1c5b42aa3dbfc91e5f169b172

    • SHA256

      ecdb1d03ac1ff9d87ae8ee41f58f995ef91d7baa6ff5c73db398442341a74940

    • SHA512

      ebf9164a8a0c6aa2edfa17a8f4ce62835e75fdae84f22c22d326b38e83bec53e0df91cc887d0d436704741792c85ba4168b3566ab76e935a475e111d6be2acc8

    • SSDEEP

      3072:OXvuD2BTruA85DUn8/TdHUsXwD+mjY1P4:OX2iuxw8bwymjv

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks