General

  • Target

    JaffaCakes118_1fa8d1a9cd0a8f342372a3f730db7150

  • Size

    405KB

  • Sample

    250106-m3n1csxkbr

  • MD5

    1fa8d1a9cd0a8f342372a3f730db7150

  • SHA1

    5333f3f8a398f54801397f3cfc401d27cc8c5c4e

  • SHA256

    f7a857653cd047a2e72c95e588f7a0766bc396ea4ec595ca437435a417f0159a

  • SHA512

    d7b4bdf2c8167e9901d149b6c8f0f4d5d78f5227bbd2fb84d355d6346404a7a4e03ce59d45aab9cc0f752360ea2a737b42e459e7bbb5e8329454fa28c858048a

  • SSDEEP

    6144:T4NdV8KovoS2SRobnM9xFAWB0a3/uCxZkLiMoy22EPAu252idC41i:IdOKorKnha32Cx2Li422XuIdp1i

Malware Config

Extracted

Family

pony

C2

http://iwofeh-hunterz.com/emma/gate.php

Attributes
  • payload_url

    http://iwofeh-hunterz.com/emma/shit.exe

Targets

    • Target

      JaffaCakes118_1fa8d1a9cd0a8f342372a3f730db7150

    • Size

      405KB

    • MD5

      1fa8d1a9cd0a8f342372a3f730db7150

    • SHA1

      5333f3f8a398f54801397f3cfc401d27cc8c5c4e

    • SHA256

      f7a857653cd047a2e72c95e588f7a0766bc396ea4ec595ca437435a417f0159a

    • SHA512

      d7b4bdf2c8167e9901d149b6c8f0f4d5d78f5227bbd2fb84d355d6346404a7a4e03ce59d45aab9cc0f752360ea2a737b42e459e7bbb5e8329454fa28c858048a

    • SSDEEP

      6144:T4NdV8KovoS2SRobnM9xFAWB0a3/uCxZkLiMoy22EPAu252idC41i:IdOKorKnha32Cx2Li422XuIdp1i

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks