General

  • Target

    JaffaCakes118_796b4bb5bee8d7b2cc1fed135d4d9360

  • Size

    563KB

  • Sample

    250104-nhe3dsxkfv

  • MD5

    796b4bb5bee8d7b2cc1fed135d4d9360

  • SHA1

    9be95e2a7f7459e2957e9beec92ce97fdd5f234b

  • SHA256

    dbdf43dbc0b1fffa654d1ce5e3384581fdc761b8b8747fd4d8099c93e5985479

  • SHA512

    4256301e8d56185ee60f2e3db060bdf19b1902464d84c5619ffbad40bddf8b9224eb517301d74cd352671458a3c353553047772fdf0bcde5f6032352ba26c5bc

  • SSDEEP

    12288:s6Wq4aaE6KwyF5L0Y2D1PqLfUZhwz5Udico8324tkmeeWtO:qthEVaPqLfYhi5RcrtzeA

Malware Config

Extracted

Family

pony

C2

http://batterysupplies.biz/LED/Panel/gate.php

Attributes
  • payload_url

    http://batterysupplies.biz/LED/Panel/specification.exe

Targets

    • Target

      JaffaCakes118_796b4bb5bee8d7b2cc1fed135d4d9360

    • Size

      563KB

    • MD5

      796b4bb5bee8d7b2cc1fed135d4d9360

    • SHA1

      9be95e2a7f7459e2957e9beec92ce97fdd5f234b

    • SHA256

      dbdf43dbc0b1fffa654d1ce5e3384581fdc761b8b8747fd4d8099c93e5985479

    • SHA512

      4256301e8d56185ee60f2e3db060bdf19b1902464d84c5619ffbad40bddf8b9224eb517301d74cd352671458a3c353553047772fdf0bcde5f6032352ba26c5bc

    • SSDEEP

      12288:s6Wq4aaE6KwyF5L0Y2D1PqLfUZhwz5Udico8324tkmeeWtO:qthEVaPqLfYhi5RcrtzeA

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks