General

  • Target

    JaffaCakes118_8af4acbd725e34fc289d81674ae0e844

  • Size

    76KB

  • Sample

    250328-yq81jssms8

  • MD5

    8af4acbd725e34fc289d81674ae0e844

  • SHA1

    280156c357b97055ca30f0a01ed359ed0db0f3e4

  • SHA256

    3dc18a14696e3abaaadee89c32ff60a963be38e7491b4fef3e7ecd59b2cd05d7

  • SHA512

    033f19e9aecf23f15e8594c3ffa1595000cc5c43116f700c04c774ea4f9d1db880701514a3d8a89b2cca2824f1a177aa0202439bd6a2290a0fef265232f305d9

  • SSDEEP

    1536:TrleJBx2zq+5hRpfvK7DKYM7zuM9GEKjgMqBit7HAko8Uck86LSUOLbJE/C6Qt:PlyDKB7qMcEKNqcn7ySUO3+6T

Malware Config

Extracted

Family

pony

C2

http://salstatic.info:2346/pony/mac.php

http://nextstats.info:2346/pony/mac.php

Targets

    • Target

      JaffaCakes118_8af4acbd725e34fc289d81674ae0e844

    • Size

      76KB

    • MD5

      8af4acbd725e34fc289d81674ae0e844

    • SHA1

      280156c357b97055ca30f0a01ed359ed0db0f3e4

    • SHA256

      3dc18a14696e3abaaadee89c32ff60a963be38e7491b4fef3e7ecd59b2cd05d7

    • SHA512

      033f19e9aecf23f15e8594c3ffa1595000cc5c43116f700c04c774ea4f9d1db880701514a3d8a89b2cca2824f1a177aa0202439bd6a2290a0fef265232f305d9

    • SSDEEP

      1536:TrleJBx2zq+5hRpfvK7DKYM7zuM9GEKjgMqBit7HAko8Uck86LSUOLbJE/C6Qt:PlyDKB7qMcEKNqcn7ySUO3+6T

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks