General

  • Target

    JaffaCakes118_0537174d374ca7af26a54b9d430ecbed

  • Size

    161KB

  • Sample

    250112-dstcnatnay

  • MD5

    0537174d374ca7af26a54b9d430ecbed

  • SHA1

    54a67aa2e33a138dc903a48c07a1b261ada9972b

  • SHA256

    6a3bd34f00a2469afc16fc3ec6e5810b01020bcd930b14a8ee18eab8a77bf669

  • SHA512

    3118721f48b873a842e16186b7dbf6fa6bb11feec0fe948db25cfc4625afc5455304a70ee02bd89e42a5ea35eb8dd1c83288c2291955b390fa98a27633d7b54f

  • SSDEEP

    1536:vw9OLaiANMMKVw2n26dfp6Z1LfyXaH2ChgTewgqcrDsXzBgxOVPp:vw9RdNMvVp2u8Z1LnH9hxwjcrDogqp

Malware Config

Extracted

Family

pony

C2

http://ser.beachbuddydogresort.com/forum/viewtopic.php

http://ser.boarddogsurferjewelry.com/forum/viewtopic.php

Attributes
  • payload_url

    http://3073.a.hostable.me/Z2U.exe

    http://85.18.21.252/PNV3Hbi.exe

Targets

    • Target

      JaffaCakes118_0537174d374ca7af26a54b9d430ecbed

    • Size

      161KB

    • MD5

      0537174d374ca7af26a54b9d430ecbed

    • SHA1

      54a67aa2e33a138dc903a48c07a1b261ada9972b

    • SHA256

      6a3bd34f00a2469afc16fc3ec6e5810b01020bcd930b14a8ee18eab8a77bf669

    • SHA512

      3118721f48b873a842e16186b7dbf6fa6bb11feec0fe948db25cfc4625afc5455304a70ee02bd89e42a5ea35eb8dd1c83288c2291955b390fa98a27633d7b54f

    • SSDEEP

      1536:vw9OLaiANMMKVw2n26dfp6Z1LfyXaH2ChgTewgqcrDsXzBgxOVPp:vw9RdNMvVp2u8Z1LnH9hxwjcrDogqp

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks