General

  • Target

    2626edb77950ab6d0a9ec0c2eb584946_JaffaCakes118

  • Size

    128KB

  • Sample

    240704-zj95pszgka

  • MD5

    2626edb77950ab6d0a9ec0c2eb584946

  • SHA1

    8d53bc051b9569c15d6682a6c20b71953bd36306

  • SHA256

    87e1073b2784387112b20462c966c352a67dccab9b16cad4b3b9f792f565f87d

  • SHA512

    8d2bebfff27060b6b0f98045d07ff9c53325a6de4a8cded870a4da109edbd979eecc3a0f35f9dc75786f4614c8ab1237461577dc728f6912dc6056241f913fd3

  • SSDEEP

    3072:uGHi6mwNZwZeqj1z5bMRTUXk9mFfVb28pi1p0Sg:+6ZRqj1z5CmkE328pi7

Malware Config

Extracted

Family

pony

C2

http://67.215.225.205:8080/forum/viewtopic.php

http://50.116.13.230/forum/viewtopic.php

Attributes
  • payload_url

    http://mega105fm.com/bb7tBrft.exe

    http://cpps.or.id/KwV8AXN.exe

    http://citleg.org/UptP.exe

Targets

    • Target

      2626edb77950ab6d0a9ec0c2eb584946_JaffaCakes118

    • Size

      128KB

    • MD5

      2626edb77950ab6d0a9ec0c2eb584946

    • SHA1

      8d53bc051b9569c15d6682a6c20b71953bd36306

    • SHA256

      87e1073b2784387112b20462c966c352a67dccab9b16cad4b3b9f792f565f87d

    • SHA512

      8d2bebfff27060b6b0f98045d07ff9c53325a6de4a8cded870a4da109edbd979eecc3a0f35f9dc75786f4614c8ab1237461577dc728f6912dc6056241f913fd3

    • SSDEEP

      3072:uGHi6mwNZwZeqj1z5bMRTUXk9mFfVb28pi1p0Sg:+6ZRqj1z5CmkE328pi7

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Email Collection

2
T1114

Tasks