General

  • Target

    JaffaCakes118_03cc24d952c1970a78cf13cf9c52ce16

  • Size

    86KB

  • Sample

    250121-l6v3eayndn

  • MD5

    03cc24d952c1970a78cf13cf9c52ce16

  • SHA1

    2608a8292c49aeff89cfc1f6f3edf8c3b812b5be

  • SHA256

    4a001cea5ef27d9794b75b52fe356cda2207b83c4653d465f3760317fee1784a

  • SHA512

    3221f628a1c29c00f72430872a4a66c435c74d5f627052bc2dc982a36ea32ca191a105e96f03563ce80b22f13cdc35120ab4c733adab38a83e459bab81d481d9

  • SSDEEP

    1536:eHHcQmCpgMFqg7NrR/U22I6Yh/NtL5+nBZbsaQq4NLtEn8ljT:encrcqgBR/r/Np5EBZbMZ9tEncj

Malware Config

Extracted

Family

pony

C2

http://reportst.info:1654/ero.php

http://beroples.info:1654/ero.php

Targets

    • Target

      JaffaCakes118_03cc24d952c1970a78cf13cf9c52ce16

    • Size

      86KB

    • MD5

      03cc24d952c1970a78cf13cf9c52ce16

    • SHA1

      2608a8292c49aeff89cfc1f6f3edf8c3b812b5be

    • SHA256

      4a001cea5ef27d9794b75b52fe356cda2207b83c4653d465f3760317fee1784a

    • SHA512

      3221f628a1c29c00f72430872a4a66c435c74d5f627052bc2dc982a36ea32ca191a105e96f03563ce80b22f13cdc35120ab4c733adab38a83e459bab81d481d9

    • SSDEEP

      1536:eHHcQmCpgMFqg7NrR/U22I6Yh/NtL5+nBZbsaQq4NLtEn8ljT:encrcqgBR/r/Np5EBZbMZ9tEncj

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks