General

  • Target

    JaffaCakes118_1baf6770f5a72d2f386ced3c91f8f8d6

  • Size

    134KB

  • Sample

    250123-2k3hcswqdy

  • MD5

    1baf6770f5a72d2f386ced3c91f8f8d6

  • SHA1

    b659ac4bf6f4cc6e8c3bdfc57feaef84e4071ddd

  • SHA256

    2c8490368b1fc8296c39178ce4339839454f3eb3c87b05cbffbb14f222f26b5b

  • SHA512

    e080903f14d3531e478bc5a0bcde7156bc00752b23026ca0731ce7114fa5b5af6b4c3d0d67a8b362d678c75be2350954353d9e5d0d67508eafeb8390615156fa

  • SSDEEP

    3072:Pu/csfMTTThOiQSKcfSyAUgTQWrPppppZppppppppppQppppppppZppppppppppl:Sfa4iucflA/TQMPppppZppppppppppQj

Malware Config

Extracted

Family

pony

C2

http://q.dugongmozambique.com/forum/viewtopic.php

http://q.e-tecinnovation.co.uk/forum/viewtopic.php

Attributes
  • payload_url

    http://mulayimakca.com/LA6KuCv7.exe

    http://imecetemizlik.com/KZyKEM.exe

Targets

    • Target

      JaffaCakes118_1baf6770f5a72d2f386ced3c91f8f8d6

    • Size

      134KB

    • MD5

      1baf6770f5a72d2f386ced3c91f8f8d6

    • SHA1

      b659ac4bf6f4cc6e8c3bdfc57feaef84e4071ddd

    • SHA256

      2c8490368b1fc8296c39178ce4339839454f3eb3c87b05cbffbb14f222f26b5b

    • SHA512

      e080903f14d3531e478bc5a0bcde7156bc00752b23026ca0731ce7114fa5b5af6b4c3d0d67a8b362d678c75be2350954353d9e5d0d67508eafeb8390615156fa

    • SSDEEP

      3072:Pu/csfMTTThOiQSKcfSyAUgTQWrPppppZppppppppppQppppppppZppppppppppl:Sfa4iucflA/TQMPppppZppppppppppQj

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.