General

  • Target

    JaffaCakes118_69e48abbb7dd7d3071ecbf1f48884750

  • Size

    82KB

  • Sample

    250103-drczaaxke1

  • MD5

    69e48abbb7dd7d3071ecbf1f48884750

  • SHA1

    11aa4a46b35776648250060db8e927bc26f8b25c

  • SHA256

    df2d80dd337a3fd66961ff137a2526ff0b98667e84753170048d4d683c56f318

  • SHA512

    b73115e227769c5adefc7009294bec783749aa333b573e21669515939101606d51782144407dca5f53004cf055646c8c3af91f0b0748b4fc17a7b857674a0543

  • SSDEEP

    1536:jRE6onjtnDv5kGbPSnaTXCSm9jmsQ3cp9bhHyXrPss6xY:jmvnJnrbPs0Wmsgcp9b19Tx

Malware Config

Extracted

Family

pony

C2

http://dkaopty.info:4915/way/like.php

http://aotmgqt.info:4915/way/like.php

Targets

    • Target

      JaffaCakes118_69e48abbb7dd7d3071ecbf1f48884750

    • Size

      82KB

    • MD5

      69e48abbb7dd7d3071ecbf1f48884750

    • SHA1

      11aa4a46b35776648250060db8e927bc26f8b25c

    • SHA256

      df2d80dd337a3fd66961ff137a2526ff0b98667e84753170048d4d683c56f318

    • SHA512

      b73115e227769c5adefc7009294bec783749aa333b573e21669515939101606d51782144407dca5f53004cf055646c8c3af91f0b0748b4fc17a7b857674a0543

    • SSDEEP

      1536:jRE6onjtnDv5kGbPSnaTXCSm9jmsQ3cp9bhHyXrPss6xY:jmvnJnrbPs0Wmsgcp9b19Tx

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks