General

  • Target

    JaffaCakes118_77a318d33a347083de0a7b025d83cb80

  • Size

    113KB

  • Sample

    250104-e4h7hatqcr

  • MD5

    77a318d33a347083de0a7b025d83cb80

  • SHA1

    59a94bbf5da4a9d5f76df8e2527732e38d852341

  • SHA256

    e836f79ea6b306f5062ddf0e2db0219740f89cb895172a1dcf5057e99484b9a4

  • SHA512

    3f3eff57b9ef4eac91ddbec6810dd98f3669c06ba62a46e1fbb7690e9b901ba846dbf7bbb7bd7556c546d30b4080e34728fb8030dd836101dbf4ad2bb4a12979

  • SSDEEP

    3072:wPUbHcqODccAeC/55X9TQ3tqwQF2v1Okw7:MUIDu75YtqvF2vY

Malware Config

Extracted

Family

pony

C2

http://storeyourbox.net/ponyz/gate.php

http://storeyourthings.net/ponyz/gate.php

http://drjoycethomasderm.com/ponyz/gate.php

http://ibounceinflatables.com/ponyz/gate.php

Attributes
  • payload_url

    http://www.fisaps.it/yYbvKmT.exe

    http://gallargues.architecture-signal.fr/3fM5C3a.exe

    http://ediltre.mnt.it/aSzw.exe

Targets

    • Target

      JaffaCakes118_77a318d33a347083de0a7b025d83cb80

    • Size

      113KB

    • MD5

      77a318d33a347083de0a7b025d83cb80

    • SHA1

      59a94bbf5da4a9d5f76df8e2527732e38d852341

    • SHA256

      e836f79ea6b306f5062ddf0e2db0219740f89cb895172a1dcf5057e99484b9a4

    • SHA512

      3f3eff57b9ef4eac91ddbec6810dd98f3669c06ba62a46e1fbb7690e9b901ba846dbf7bbb7bd7556c546d30b4080e34728fb8030dd836101dbf4ad2bb4a12979

    • SSDEEP

      3072:wPUbHcqODccAeC/55X9TQ3tqwQF2v1Okw7:MUIDu75YtqvF2vY

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks