General

  • Target

    JaffaCakes118_a987e36cfb8342f66da84db04ddb9a29

  • Size

    153KB

  • Sample

    250118-pfzvfstpdr

  • MD5

    a987e36cfb8342f66da84db04ddb9a29

  • SHA1

    b368e5e78582420f6632c94a14c717ac8d476157

  • SHA256

    1fc014bab49e36ab662116a7dcd14b59064592640cfbfb147fcaf8d984751b70

  • SHA512

    3745fc2d1efac1133abfef8089dd21dae8fd76bee544b523295c59498ecdd00e6b6bc6376e8440a1097e6ce201c0b182e95bb55ea33d7827b803d1ff7541a120

  • SSDEEP

    3072:Sq4brSD382oozWvyU8B5WKE4//GJPzu5ayIwbXqmcxYF6OsAvXaywEFpiiAw7nye:SZbrSD3B0apBv3w+4qkkwfc

Malware Config

Extracted

Family

pony

C2

http://2.gaza-hackers.org/forum/viewtopic.php

http://2.gaza-hackers.net/forum/viewtopic.php

Attributes
  • payload_url

    http://3073.a.hostable.me/Z2U.exe

    http://85.18.21.252/PNV3Hbi.exe

Targets

    • Target

      JaffaCakes118_a987e36cfb8342f66da84db04ddb9a29

    • Size

      153KB

    • MD5

      a987e36cfb8342f66da84db04ddb9a29

    • SHA1

      b368e5e78582420f6632c94a14c717ac8d476157

    • SHA256

      1fc014bab49e36ab662116a7dcd14b59064592640cfbfb147fcaf8d984751b70

    • SHA512

      3745fc2d1efac1133abfef8089dd21dae8fd76bee544b523295c59498ecdd00e6b6bc6376e8440a1097e6ce201c0b182e95bb55ea33d7827b803d1ff7541a120

    • SSDEEP

      3072:Sq4brSD382oozWvyU8B5WKE4//GJPzu5ayIwbXqmcxYF6OsAvXaywEFpiiAw7nye:SZbrSD3B0apBv3w+4qkkwfc

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks