General

  • Target

    JaffaCakes118_77c3ffe2b1d6ecc85562f074a4c5e13b

  • Size

    94KB

  • Sample

    250104-fl2fssvqfl

  • MD5

    77c3ffe2b1d6ecc85562f074a4c5e13b

  • SHA1

    47fc7c7b7496d50a817a325766c051e7c609f9a2

  • SHA256

    5e83ace43913ac2fddb78e86424ccf082a06ab0ddfff1789ff903b140ba455f5

  • SHA512

    d184bff23fd21bb7f489490bcf9294512e59ec8e09d7c0017bc28de09fd509cd77dfd52c02feaefc9eac44b896e8a82f80245174f9bf5edfd33960e3dd35e3fb

  • SSDEEP

    1536:IuvdgazQh6C1QC5s2DnTjrBlxUi/vt0Og1GSbIlMYsJbjVMIAiStr94oPe:tvdwmC5rbTjVsi/vhgx9YsJrw94o

Malware Config

Extracted

Family

pony

C2

http://kdsogeu.pw:4915/way/like.php

http://mgfdkfy.pw:4915/way/like.php

Targets

    • Target

      JaffaCakes118_77c3ffe2b1d6ecc85562f074a4c5e13b

    • Size

      94KB

    • MD5

      77c3ffe2b1d6ecc85562f074a4c5e13b

    • SHA1

      47fc7c7b7496d50a817a325766c051e7c609f9a2

    • SHA256

      5e83ace43913ac2fddb78e86424ccf082a06ab0ddfff1789ff903b140ba455f5

    • SHA512

      d184bff23fd21bb7f489490bcf9294512e59ec8e09d7c0017bc28de09fd509cd77dfd52c02feaefc9eac44b896e8a82f80245174f9bf5edfd33960e3dd35e3fb

    • SSDEEP

      1536:IuvdgazQh6C1QC5s2DnTjrBlxUi/vt0Og1GSbIlMYsJbjVMIAiStr94oPe:tvdwmC5rbTjVsi/vhgx9YsJrw94o

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks