General

  • Target

    JaffaCakes118_5d69ce0d60424f2e5a9afa48d95d49c0

  • Size

    90KB

  • Sample

    250101-vnlwfstpcz

  • MD5

    5d69ce0d60424f2e5a9afa48d95d49c0

  • SHA1

    6e27d072bd3e98317c2d9141be430de60acc2984

  • SHA256

    adf97237b46a7c2d1a09757a2fdd4e2087f7161aa42fe1d1eb64140cef682b41

  • SHA512

    7062c0a8135e76452ed99a310d2bb9b093e5e0e9c79605c2c57cf7e5495d24a0fdab3b726c8911d856fa149e8eeb1d40f45b0f41c32d444c562f17f4c52d1210

  • SSDEEP

    1536:FFLss+Bg2Unt+A5Kj2WcMgVUmTn/XHHjNJ9YB56/JW7KmW9VY/:vLspBgvt+XjOWmTn/Xq31ei

Malware Config

Extracted

Family

pony

C2

http://ldepteu.pw:4915/way/like.php

http://kclkeuy.pw:4915/way/like.php

Targets

    • Target

      JaffaCakes118_5d69ce0d60424f2e5a9afa48d95d49c0

    • Size

      90KB

    • MD5

      5d69ce0d60424f2e5a9afa48d95d49c0

    • SHA1

      6e27d072bd3e98317c2d9141be430de60acc2984

    • SHA256

      adf97237b46a7c2d1a09757a2fdd4e2087f7161aa42fe1d1eb64140cef682b41

    • SHA512

      7062c0a8135e76452ed99a310d2bb9b093e5e0e9c79605c2c57cf7e5495d24a0fdab3b726c8911d856fa149e8eeb1d40f45b0f41c32d444c562f17f4c52d1210

    • SSDEEP

      1536:FFLss+Bg2Unt+A5Kj2WcMgVUmTn/XHHjNJ9YB56/JW7KmW9VY/:vLspBgvt+XjOWmTn/Xq31ei

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks