General

  • Target

    JaffaCakes118_0e60b185f08ff0e9928354b3cb7acde8

  • Size

    143KB

  • Sample

    250122-rgel1szlfw

  • MD5

    0e60b185f08ff0e9928354b3cb7acde8

  • SHA1

    ebaf440093b6cb3e4695dddfec8d96a753f1e194

  • SHA256

    8e98754cf68bd5f26d084a8fa18abd1bab87f47a7efc12554ee830283944a815

  • SHA512

    bde48674743126677b15532c05fea1830364360d3a178ea2aa7333690254081379756c8bbd67449a5519b63306dc74af4b1f488b1cc42b1c076c43780109b050

  • SSDEEP

    3072:XjlKZelTDQcnUt7Z9+/Sggr9oob5/cupWApaJGtOg:JwelzUtN9+qNDbGqactZ

Malware Config

Extracted

Family

pony

C2

http://66.55.89.150:8080/ponys/gate.php

http://66.55.89.151:8080/ponys/gate.php

Attributes
  • payload_url

    http://bde-essec.com/1ePZ.exe

    http://wilde.webprojekt.ch/uyNcp.exe

    http://www.ronale.com/rFsckgVS.exe

    http://207.57.248.58/1VyR6.exe

Targets

    • Target

      JaffaCakes118_0e60b185f08ff0e9928354b3cb7acde8

    • Size

      143KB

    • MD5

      0e60b185f08ff0e9928354b3cb7acde8

    • SHA1

      ebaf440093b6cb3e4695dddfec8d96a753f1e194

    • SHA256

      8e98754cf68bd5f26d084a8fa18abd1bab87f47a7efc12554ee830283944a815

    • SHA512

      bde48674743126677b15532c05fea1830364360d3a178ea2aa7333690254081379756c8bbd67449a5519b63306dc74af4b1f488b1cc42b1c076c43780109b050

    • SSDEEP

      3072:XjlKZelTDQcnUt7Z9+/Sggr9oob5/cupWApaJGtOg:JwelzUtN9+qNDbGqactZ

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks