General

  • Target

    JaffaCakes118_8adf3f9f2a58d9ff8cfca44da672886c

  • Size

    131KB

  • Sample

    250328-v29jns1ls7

  • MD5

    8adf3f9f2a58d9ff8cfca44da672886c

  • SHA1

    ac21385b14a95756bbb889d836fcaf873ca2062a

  • SHA256

    31f6c70a4a3368251bf8f055baa253223a6c873e2011165c85abb7b71c1805c3

  • SHA512

    3ac55df38c43530d4e23f3f3e2087b92105db2404b5d62102617349f6686a5f7270eb4487b5d72b325ec9e23b336a90712806abd63026540b25bb2b93123376b

  • SSDEEP

    1536:St+ZdUkwzpZ11Kg39ZQUOI+4hpm5jaqRWm94yX3VX6ZPEiEUvLau:yadgpvNqV/Gzq4myyt65Xv2u

Malware Config

Extracted

Family

pony

C2

http://108.178.59.12/forum/viewtopic.php

http://69.194.194.247/forum/viewtopic.php

Attributes
  • payload_url

    http://www.welatec.ch/3K8T5Hu.exe

    http://topnewebooks.com/AqS.exe

    http://www.acibr.org.br/PATgKq.exe

Targets

    • Target

      JaffaCakes118_8adf3f9f2a58d9ff8cfca44da672886c

    • Size

      131KB

    • MD5

      8adf3f9f2a58d9ff8cfca44da672886c

    • SHA1

      ac21385b14a95756bbb889d836fcaf873ca2062a

    • SHA256

      31f6c70a4a3368251bf8f055baa253223a6c873e2011165c85abb7b71c1805c3

    • SHA512

      3ac55df38c43530d4e23f3f3e2087b92105db2404b5d62102617349f6686a5f7270eb4487b5d72b325ec9e23b336a90712806abd63026540b25bb2b93123376b

    • SSDEEP

      1536:St+ZdUkwzpZ11Kg39ZQUOI+4hpm5jaqRWm94yX3VX6ZPEiEUvLau:yadgpvNqV/Gzq4myyt65Xv2u

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks