General

  • Target

    JaffaCakes118_1599bc1397211d1a713a95771d22f278

  • Size

    153KB

  • Sample

    250112-xb8ksstnh1

  • MD5

    1599bc1397211d1a713a95771d22f278

  • SHA1

    c830f74ff9cfe77121ac74915e42ff9cf59a34c9

  • SHA256

    2713d9a5b461f13160f6f614abf5d4612255aa140e1c8320170ca5e5251617a0

  • SHA512

    62f03094e63df9d1b1780adc115a666e0bc574e27d8da124cca2b6aef60b90b26297adb3fa71130b9f6a951a6082b0188df01c478df8429c548a08a62b4294fc

  • SSDEEP

    3072:Rs0MvPxK/sK9Dv3+bLpxR/E3h/rracK9MuSl+SOc4X:RsvPxK/sKV2bLpnMhnEMu/SOcu

Malware Config

Extracted

Family

pony

C2

http://one.mindin.info/forum/viewtopic.php

http://one.mmtalk.com/forum/viewtopic.php

Attributes
  • payload_url

    http://3073.a.hostable.me/Z2U.exe

    http://85.18.21.252/PNV3Hbi.exe

Targets

    • Target

      JaffaCakes118_1599bc1397211d1a713a95771d22f278

    • Size

      153KB

    • MD5

      1599bc1397211d1a713a95771d22f278

    • SHA1

      c830f74ff9cfe77121ac74915e42ff9cf59a34c9

    • SHA256

      2713d9a5b461f13160f6f614abf5d4612255aa140e1c8320170ca5e5251617a0

    • SHA512

      62f03094e63df9d1b1780adc115a666e0bc574e27d8da124cca2b6aef60b90b26297adb3fa71130b9f6a951a6082b0188df01c478df8429c548a08a62b4294fc

    • SSDEEP

      3072:Rs0MvPxK/sK9Dv3+bLpxR/E3h/rracK9MuSl+SOc4X:RsvPxK/sKV2bLpnMhnEMu/SOcu

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks