General

  • Target

    c7ddae6b60b26ad124adaee602a607c8_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240828-3tq2cssgkg

  • MD5

    c7ddae6b60b26ad124adaee602a607c8

  • SHA1

    a8f8288f7b96feacaaf39282b798c64d6284c58e

  • SHA256

    94213eccf10bd5df642038cfe9b343a544e769d911dca478838388cef1a93570

  • SHA512

    5056392e8fc27003238bf9ed33c9659937c8f7c44ca4061708dd2076376bed7ba339cda90999198ef000d45cafde414fd34b250fd7c6ab8af4fed223c71946cb

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ1:0UzeyQMS4DqodCnoe+iitjWwwZ

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      c7ddae6b60b26ad124adaee602a607c8_JaffaCakes118

    • Size

      2.2MB

    • MD5

      c7ddae6b60b26ad124adaee602a607c8

    • SHA1

      a8f8288f7b96feacaaf39282b798c64d6284c58e

    • SHA256

      94213eccf10bd5df642038cfe9b343a544e769d911dca478838388cef1a93570

    • SHA512

      5056392e8fc27003238bf9ed33c9659937c8f7c44ca4061708dd2076376bed7ba339cda90999198ef000d45cafde414fd34b250fd7c6ab8af4fed223c71946cb

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ1:0UzeyQMS4DqodCnoe+iitjWwwZ

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks