General

  • Target

    JaffaCakes118_0ba68d930789bf3e3bc6e7300b7fd2ab

  • Size

    119KB

  • Sample

    250122-jk2lyswmfr

  • MD5

    0ba68d930789bf3e3bc6e7300b7fd2ab

  • SHA1

    52df8f8d22eff1731f45e143fa24471548b04247

  • SHA256

    a89fb83c22136798eefaf71c16a0534bdfa56e29498129816fca669fa052bfcd

  • SHA512

    8d941aaa92092b5dd380445cebc231ae78469a86857d380607ecb05e31616e6a9e8cbcc58e59a38bc8af050682cad94e9ce4c01880fe8b80c64004fde734acdd

  • SSDEEP

    1536:Yu3d5IR7taQdTXuvxlDSOg/Tv3eHKCEijn3iS7xcPm5qitGt66B7nsaLGxGXe/:p+lYlDSOuTfiLX7OPmJGt667nMSe/

Malware Config

Extracted

Family

pony

C2

http://nazarian.pl:8080/pony/gate.php

http://pbx.pc0.ru:8080/pony/gate.php

Attributes
  • payload_url

    http://sdrifs.tempsite.ws/ax1.exe

Targets

    • Target

      JaffaCakes118_0ba68d930789bf3e3bc6e7300b7fd2ab

    • Size

      119KB

    • MD5

      0ba68d930789bf3e3bc6e7300b7fd2ab

    • SHA1

      52df8f8d22eff1731f45e143fa24471548b04247

    • SHA256

      a89fb83c22136798eefaf71c16a0534bdfa56e29498129816fca669fa052bfcd

    • SHA512

      8d941aaa92092b5dd380445cebc231ae78469a86857d380607ecb05e31616e6a9e8cbcc58e59a38bc8af050682cad94e9ce4c01880fe8b80c64004fde734acdd

    • SSDEEP

      1536:Yu3d5IR7taQdTXuvxlDSOg/Tv3eHKCEijn3iS7xcPm5qitGt66B7nsaLGxGXe/:p+lYlDSOuTfiLX7OPmJGt667nMSe/

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks