General

  • Target

    c9bb79499a82740c7133c5fb24008c06_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240829-14metawbnj

  • MD5

    c9bb79499a82740c7133c5fb24008c06

  • SHA1

    f13cd00e4843516a9abd591f902aec8db3db0f12

  • SHA256

    7bf6abcd3faab06aa6accc74ec43f0781470940229bfc7539048294d6ca3b300

  • SHA512

    ba8015d158f0ae1e0f4fe181a16639c490f7708e5b47543c8a7e5d03bd48b398ef519cddc20ed7c5de977cca7510e9fbfa2666eaafbaf461a2bac5f434c10bb0

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlk:86SIROiFJiwp0xlrlk

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      c9bb79499a82740c7133c5fb24008c06_JaffaCakes118

    • Size

      2.6MB

    • MD5

      c9bb79499a82740c7133c5fb24008c06

    • SHA1

      f13cd00e4843516a9abd591f902aec8db3db0f12

    • SHA256

      7bf6abcd3faab06aa6accc74ec43f0781470940229bfc7539048294d6ca3b300

    • SHA512

      ba8015d158f0ae1e0f4fe181a16639c490f7708e5b47543c8a7e5d03bd48b398ef519cddc20ed7c5de977cca7510e9fbfa2666eaafbaf461a2bac5f434c10bb0

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlk:86SIROiFJiwp0xlrlk

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks