General

  • Target

    JaffaCakes118_252330640a558655b2330edd2390a253

  • Size

    128KB

  • Sample

    250124-y7m5eaxjaz

  • MD5

    252330640a558655b2330edd2390a253

  • SHA1

    35dddf61b795c9a6c8a16840bc5e274a7af05f41

  • SHA256

    f8f1738fa7653257b3cd9a419fc8e9d975031d7a8c02b80ea20e48c39cb01388

  • SHA512

    94981832123645965901b542d6c8d5d5ba09c243ad4d0eb8f23fbafe9c04558a068b5675ac7453b84730f553fdd9fb8c63213eb11f9fdab2759f52c9da1f278c

  • SSDEEP

    3072:PGHi6mwTvTbCsJ3JBt31C9HQRma45OWAk/vu5y95:VsvysJ3JB3dRmTOWAk3

Malware Config

Extracted

Family

pony

C2

http://67.215.225.205:8080/forum/viewtopic.php

http://209.59.219.88/forum/viewtopic.php

Attributes
  • payload_url

    http://ctl-mexico.com/WtgME.exe

    http://cvilleshootingstars.com/JzU.exe

    http://ctamdq.org.ar/bigQm.exe

Targets

    • Target

      JaffaCakes118_252330640a558655b2330edd2390a253

    • Size

      128KB

    • MD5

      252330640a558655b2330edd2390a253

    • SHA1

      35dddf61b795c9a6c8a16840bc5e274a7af05f41

    • SHA256

      f8f1738fa7653257b3cd9a419fc8e9d975031d7a8c02b80ea20e48c39cb01388

    • SHA512

      94981832123645965901b542d6c8d5d5ba09c243ad4d0eb8f23fbafe9c04558a068b5675ac7453b84730f553fdd9fb8c63213eb11f9fdab2759f52c9da1f278c

    • SSDEEP

      3072:PGHi6mwTvTbCsJ3JBt31C9HQRma45OWAk/vu5y95:VsvysJ3JB3dRmTOWAk3

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks