General

  • Target

    JaffaCakes118_a76ce7786bd7d2d49f5f75b78bb1b998

  • Size

    143KB

  • Sample

    250410-abf48awvgz

  • MD5

    a76ce7786bd7d2d49f5f75b78bb1b998

  • SHA1

    5ed4f88246897a315c9bd8bc8e59f8ba072e9794

  • SHA256

    4da5fcd3477e2f70471dde0ef2ea5239ac103562c8fd06b3fd7c3c047ba20b15

  • SHA512

    07bd954aeeff02de1e39f3166ec9b137a88d12cec87a3db6a599a7af0f931c6030604ba4ff8e5356d5e355dc333a7f3d59618b9c6b3951ed9f524fb807e3ada3

  • SSDEEP

    3072:35U5Degxjow5RSEGslwA9WlE4FzuIkFe3A3G429R:JKX5RSEQFz1kFZG39

Malware Config

Extracted

Family

pony

C2

http://eyon-neos.eu:8080/forum/viewtopic.php

http://quest.social-neos.eu:8080/forum/viewtopic.php

http://social-neos.eu:8080/forum/viewtopic.php

http://carmine.warsheet.com:8080/forum/viewtopic.php

Attributes
  • payload_url

    http://croydonairportcars.com/XwGq.exe

    http://opusbastelgruppe.de/Hx9RVeeY.exe

    http://intraelegancia.info/0AZLM4k1.exe

    http://worksheet.ubwebserver.com/39sfijvR.exe

    http://ropanet.com/oSt.exe

    http://jakubsroka.com/s3g2e.exe

    http://hclights.com/Wy9xhDQ.exe

    http://turkteleport.com.tr/zxHkgYNH.exe

    http://im-agency.com/Y4Z9NeFd.exe

Targets

    • Target

      JaffaCakes118_a76ce7786bd7d2d49f5f75b78bb1b998

    • Size

      143KB

    • MD5

      a76ce7786bd7d2d49f5f75b78bb1b998

    • SHA1

      5ed4f88246897a315c9bd8bc8e59f8ba072e9794

    • SHA256

      4da5fcd3477e2f70471dde0ef2ea5239ac103562c8fd06b3fd7c3c047ba20b15

    • SHA512

      07bd954aeeff02de1e39f3166ec9b137a88d12cec87a3db6a599a7af0f931c6030604ba4ff8e5356d5e355dc333a7f3d59618b9c6b3951ed9f524fb807e3ada3

    • SSDEEP

      3072:35U5Degxjow5RSEGslwA9WlE4FzuIkFe3A3G429R:JKX5RSEQFz1kFZG39

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v16

Tasks