General

  • Target

    JaffaCakes118_93131ff24484d8d307deef0536a93d0e

  • Size

    81KB

  • Sample

    250329-xj5h4sxqs8

  • MD5

    93131ff24484d8d307deef0536a93d0e

  • SHA1

    3160cd9c452958549303fc1e87f129be237371e7

  • SHA256

    4ac35d2952f37ca2efc8f804b12059c4a86b4c64ae364b931d7202ce1f5d6c2b

  • SHA512

    94d661d686b719369b5370c8479ab18ecfe1704798c52a1b4d8a347573baf5174160d509e6f30b2fbc136c5fa728252a4ce93047c617c35904c06eabd42de25a

  • SSDEEP

    1536:yyYiaMURqLZRBm7NBgzG5MyH9J1NR1Oyzg4mKcKqToBgZo2gIuvT93D+yKZy:naQlq7n0whYcHEvIApuvhyyK

Malware Config

Extracted

Family

pony

C2

http://salips.info:2346/pony/mac.php

http://i5stat.info:2346/pony/mac.php

Targets

    • Target

      JaffaCakes118_93131ff24484d8d307deef0536a93d0e

    • Size

      81KB

    • MD5

      93131ff24484d8d307deef0536a93d0e

    • SHA1

      3160cd9c452958549303fc1e87f129be237371e7

    • SHA256

      4ac35d2952f37ca2efc8f804b12059c4a86b4c64ae364b931d7202ce1f5d6c2b

    • SHA512

      94d661d686b719369b5370c8479ab18ecfe1704798c52a1b4d8a347573baf5174160d509e6f30b2fbc136c5fa728252a4ce93047c617c35904c06eabd42de25a

    • SSDEEP

      1536:yyYiaMURqLZRBm7NBgzG5MyH9J1NR1Oyzg4mKcKqToBgZo2gIuvT93D+yKZy:naQlq7n0whYcHEvIApuvhyyK

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.