General

  • Target

    JaffaCakes118_4c7cb04356a49c450f6b085b74b777f5

  • Size

    143KB

  • Sample

    250128-s2mnsswmdk

  • MD5

    4c7cb04356a49c450f6b085b74b777f5

  • SHA1

    f8cd186f07e50443ca7543044cb3c2c3a7c51aec

  • SHA256

    39b6084e9099e4354e5b7c6fd878447395564a9fd5c24851cd58282428c000c7

  • SHA512

    c777b19f68dcaf31fec9e31cc76c60611936600f33c7880f5d99e86324cf5c17570b0c885b4c7709e3d30693e51693f546d03343d29fbe131560a3f6e71ee31c

  • SSDEEP

    3072:XjlKZelTDguP1VFdZW2cp5bsup9TbZVdnppcpaJqDqpH:JwelN7FDW2uPHbbt4aAWpH

Malware Config

Extracted

Family

pony

C2

http://66.55.89.150:8080/forum/viewtopic.php

http://66.55.89.151:8080/forum/viewtopic.php

Attributes
  • payload_url

    http://entdeckeschweden.de/awk4jNK.exe

    http://sarpmaden.com.tr/eA6xk.exe

    http://www.rsproyecto2.com/m4XY.exe

Targets

    • Target

      JaffaCakes118_4c7cb04356a49c450f6b085b74b777f5

    • Size

      143KB

    • MD5

      4c7cb04356a49c450f6b085b74b777f5

    • SHA1

      f8cd186f07e50443ca7543044cb3c2c3a7c51aec

    • SHA256

      39b6084e9099e4354e5b7c6fd878447395564a9fd5c24851cd58282428c000c7

    • SHA512

      c777b19f68dcaf31fec9e31cc76c60611936600f33c7880f5d99e86324cf5c17570b0c885b4c7709e3d30693e51693f546d03343d29fbe131560a3f6e71ee31c

    • SSDEEP

      3072:XjlKZelTDguP1VFdZW2cp5bsup9TbZVdnppcpaJqDqpH:JwelN7FDW2uPHbbt4aAWpH

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Deletes itself

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks