General

  • Target

    JaffaCakes118_43126a65594239b5661ff05c5c928cb0

  • Size

    88KB

  • Sample

    250101-cdtjfazpey

  • MD5

    43126a65594239b5661ff05c5c928cb0

  • SHA1

    9c9c0d6674bb4a6950d3963c4e9cbfc9e4a8d739

  • SHA256

    da45aaa6efb864c480ad0414aa3532c850eb2d071638b1c497c2a5425c0c40c2

  • SHA512

    701a3d3aa20ca5b3f2ddd02c269decc0b1c01c7cd1434bbd70c87f4cd17d93a6feddbee526bdd7c9202b531056251df9e2496854196c41d55e84974bfb752cdc

  • SSDEEP

    1536:x3V3e8KytqTZkYu5SCvaDBzgM+5zu9kS24zxAkOg8WTvMEIqkzZ3:9dOy+ubiDBzv+1H4OgYEIF3

Malware Config

Extracted

Family

pony

C2

http://activaweb.com.mx/default.php?oY8GzX1eFSRxvSSEzhebrCXGKU5Ttmr8aSd

http://old.serwis-krakow.pl/default.php?o1qJGyrJkoMdZqNmLXcLxf4Sc3eNNHU

http://tiagodasilva.comuf.com/default.php?CckCbvA1XOsyEZ5omIbcST6JuJ45s

http://tradelinkengineering.com/default.php?3GzyNTr2y3qGdEllaLypgJ3rO3B

http://cys.comlu.com/default.php?BOBY7CKuvhVO4XFydmoYQdR6zbXhF3WSTumVyl

Targets

    • Target

      JaffaCakes118_43126a65594239b5661ff05c5c928cb0

    • Size

      88KB

    • MD5

      43126a65594239b5661ff05c5c928cb0

    • SHA1

      9c9c0d6674bb4a6950d3963c4e9cbfc9e4a8d739

    • SHA256

      da45aaa6efb864c480ad0414aa3532c850eb2d071638b1c497c2a5425c0c40c2

    • SHA512

      701a3d3aa20ca5b3f2ddd02c269decc0b1c01c7cd1434bbd70c87f4cd17d93a6feddbee526bdd7c9202b531056251df9e2496854196c41d55e84974bfb752cdc

    • SSDEEP

      1536:x3V3e8KytqTZkYu5SCvaDBzgM+5zu9kS24zxAkOg8WTvMEIqkzZ3:9dOy+ubiDBzv+1H4OgYEIF3

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks