General

  • Target

    471035bceeb4b9ae334c36d3201294a3d68b773d8a748c91eb439575fdb3d106_NeikiAnalytics

  • Size

    2.2MB

  • Sample

    240521-pbr9tadb81

  • MD5

    5dd4ffa4547ffc7807bd678b06509dc6

  • SHA1

    ee042b17abfca7909032601b221217728162ae9e

  • SHA256

    471035bceeb4b9ae334c36d3201294a3d68b773d8a748c91eb439575fdb3d106

  • SHA512

    e9f844418d556ca59c2b37af9ed69c7b8a8639ea51763bce3bca28d557cd6956b8c13927651635b8980af1775a424dbd284bd9cb0b429fc2f2f55ae46c770993

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZT:0UzeyQMS4DqodCnoe+iitjWwwv

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      471035bceeb4b9ae334c36d3201294a3d68b773d8a748c91eb439575fdb3d106_NeikiAnalytics

    • Size

      2.2MB

    • MD5

      5dd4ffa4547ffc7807bd678b06509dc6

    • SHA1

      ee042b17abfca7909032601b221217728162ae9e

    • SHA256

      471035bceeb4b9ae334c36d3201294a3d68b773d8a748c91eb439575fdb3d106

    • SHA512

      e9f844418d556ca59c2b37af9ed69c7b8a8639ea51763bce3bca28d557cd6956b8c13927651635b8980af1775a424dbd284bd9cb0b429fc2f2f55ae46c770993

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZT:0UzeyQMS4DqodCnoe+iitjWwwv

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Modifies Installed Components in the registry

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

4
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Discovery

System Information Discovery

1
T1082

Tasks