General

  • Target

    JaffaCakes118_3ce6d75e9efaaa6bfec0cbfc3c13221d

  • Size

    170KB

  • Sample

    250127-hflt9swkhy

  • MD5

    3ce6d75e9efaaa6bfec0cbfc3c13221d

  • SHA1

    64e8d0a205ae12fac09aa3886d04e2c2596a560b

  • SHA256

    6c947eb8f1a6c1c1a0faaab9eaa083097b98801ea43d319ee3368e3b6ca10896

  • SHA512

    ab4dbf32b4eec30f842cc4f8cb845b9058428d2406315139b1239a00d6495217f5e55910aef08037557756c0ac74648383f9f35347ba93694907fcad2a6c57f9

  • SSDEEP

    3072:IslkrbznLClVExWC8KLluOwoLlE2Je2giJ3UsxEo/StYNr8JUXPhxMLKiKHGtD79:rkLnXxgKweBJQsuoUU/hxMGiOgKU

Malware Config

Extracted

Family

pony

C2

http://mx9.inboxgateway.com/Uploads/353/Panel/gate.php

Targets

    • Target

      Ecard.exe

    • Size

      241KB

    • MD5

      7e8ea0313d709af979371f4181e183c7

    • SHA1

      c34fa5d05d805dbb0db6625ab2a9ad0c5e3a3fea

    • SHA256

      dcfa763016f07b439755539138f7bdc187d21272ba2ce7d7f18f34f23e10a8f5

    • SHA512

      92cb728473f30f3083a68ec8a0c49763481a045f8af3ba6977b172c40497b3811a4390aa0d0a230a7c4ab2cb00229f201606937f7f4846b42df686fc0d64119c

    • SSDEEP

      3072:SoRSFAdV76EVe5qK79HFg1C8KLluOwoLlE2te2giJ3UKxEo/StYNr8JUXZsxMxM:60LVe5fYVKweBtQKuoUUrxMrYo

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks