General

  • Target

    JaffaCakes118_46fa332cc627afb62f8bc1ecf21acc83

  • Size

    103KB

  • Sample

    250128-fbmjwsxrbm

  • MD5

    46fa332cc627afb62f8bc1ecf21acc83

  • SHA1

    5c54359e8e822adb0c7a173beab89440d87ea183

  • SHA256

    11d70efc262f01a2a856d331b65ba1018aa50739bbd394d31dc8dd0c5b93d04b

  • SHA512

    f3a5e2e887bf3cc492701a5c8f9928626475d7bbcc70a84d689f82134428043f02447b066a850781a4ded4c06f20cd3705d36e065f1141bc186cd8295f16bd3a

  • SSDEEP

    768:RVja4dWAK2cCDaImu2XY3TpJ6kBfKGzk+J+WU2tMe8xTb8I82lczPzhgLa1K:73uC2hfXeECi2ix5N6zPzOLac

Malware Config

Extracted

Family

pony

C2

http://ponysoft.org/rsfgrggge1ww87.php

Attributes
  • payload_url

    http://gogohealth.ru/1.exe

Targets

    • Target

      JaffaCakes118_46fa332cc627afb62f8bc1ecf21acc83

    • Size

      103KB

    • MD5

      46fa332cc627afb62f8bc1ecf21acc83

    • SHA1

      5c54359e8e822adb0c7a173beab89440d87ea183

    • SHA256

      11d70efc262f01a2a856d331b65ba1018aa50739bbd394d31dc8dd0c5b93d04b

    • SHA512

      f3a5e2e887bf3cc492701a5c8f9928626475d7bbcc70a84d689f82134428043f02447b066a850781a4ded4c06f20cd3705d36e065f1141bc186cd8295f16bd3a

    • SSDEEP

      768:RVja4dWAK2cCDaImu2XY3TpJ6kBfKGzk+J+WU2tMe8xTb8I82lczPzhgLa1K:73uC2hfXeECi2ix5N6zPzOLac

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks