General

  • Target

    JaffaCakes118_6ac0b7b75f7e4c86355f00da75865130

  • Size

    96KB

  • Sample

    250103-g47afavqbj

  • MD5

    6ac0b7b75f7e4c86355f00da75865130

  • SHA1

    c8d482a172edce21d1b5bed0a20a49d902254871

  • SHA256

    125b7afa01f85142fb17e8625b5531e0682f79d23e2130d26ef5a55857123dff

  • SHA512

    729320a0fce444be3078df1038f4bda9bceb7300aef145da2a8e3e7ed48312477defc8f64763ae6e209aeef44a08609da9f1e06fbb04aba45da8603e0af7d6f4

  • SSDEEP

    1536:/tg4im6ULpPlu7HrPjbWSa3ibO3VSXn0fGCqJISnidflaebCfZ:+4imLpPl0rju3s6SXn0+ChRfNW

Malware Config

Extracted

Family

pony

C2

http://splwiu.info:2013/pic/staff.php

http://slepoz.info:2013/pic/staff.php

Targets

    • Target

      JaffaCakes118_6ac0b7b75f7e4c86355f00da75865130

    • Size

      96KB

    • MD5

      6ac0b7b75f7e4c86355f00da75865130

    • SHA1

      c8d482a172edce21d1b5bed0a20a49d902254871

    • SHA256

      125b7afa01f85142fb17e8625b5531e0682f79d23e2130d26ef5a55857123dff

    • SHA512

      729320a0fce444be3078df1038f4bda9bceb7300aef145da2a8e3e7ed48312477defc8f64763ae6e209aeef44a08609da9f1e06fbb04aba45da8603e0af7d6f4

    • SSDEEP

      1536:/tg4im6ULpPlu7HrPjbWSa3ibO3VSXn0fGCqJISnidflaebCfZ:+4imLpPl0rju3s6SXn0+ChRfNW

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks