General

  • Target

    JaffaCakes118_32444ef4b9fef32f028ca0124dc0bb48

  • Size

    147KB

  • Sample

    250126-ecpj7ssmgk

  • MD5

    32444ef4b9fef32f028ca0124dc0bb48

  • SHA1

    ce7aa662c1438f7c39258d0cebdd0666d8d15f84

  • SHA256

    12c93d46ab9ccbaa3f76bdab5cd8f9c35c05c1b2f2bbfbbfd2d13a17c39689ea

  • SHA512

    e0ae87010b423eae4fe76bf96582d182b495873c19e30fd952a6048457d1d7be34a19a3ec0f0edca8d2b011f8c98f4bccacfcfa992c3891447cff23a70ec7366

  • SSDEEP

    3072:z5Rfr1ZZpFhVpnopGXIvDbKfn4YO6P6morL3Atm3TJ4Dl:z5tr5BVFoNbbKfTHtm3TJ4D

Malware Config

Extracted

Family

pony

C2

http://sam-latrilogie.com:8080/pony/gate.php

http://loceanic.fr:8080/pony/gate.php

Attributes
  • payload_url

    http://propasmanagement.com/qTNc.exe

    http://toffanoseventos.com.br/EFcT.exe

    http://www.graficasalli.com.br/AqnAaH.exe

Targets

    • Target

      JaffaCakes118_32444ef4b9fef32f028ca0124dc0bb48

    • Size

      147KB

    • MD5

      32444ef4b9fef32f028ca0124dc0bb48

    • SHA1

      ce7aa662c1438f7c39258d0cebdd0666d8d15f84

    • SHA256

      12c93d46ab9ccbaa3f76bdab5cd8f9c35c05c1b2f2bbfbbfd2d13a17c39689ea

    • SHA512

      e0ae87010b423eae4fe76bf96582d182b495873c19e30fd952a6048457d1d7be34a19a3ec0f0edca8d2b011f8c98f4bccacfcfa992c3891447cff23a70ec7366

    • SSDEEP

      3072:z5Rfr1ZZpFhVpnopGXIvDbKfn4YO6P6morL3Atm3TJ4Dl:z5tr5BVFoNbbKfTHtm3TJ4D

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks