General

  • Target

    c82ee1f3076480ab8c080d83b7535495_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240829-ed6vwasdme

  • MD5

    c82ee1f3076480ab8c080d83b7535495

  • SHA1

    65b50eb05415e43c30200c5c6af7c21ace92bec0

  • SHA256

    c57382aa9fc63a52d13f5a3f124599abfd00fd3e73353eb4be88cad92861db5c

  • SHA512

    9f811755e133127e6c184db7545e84720ec2a538b30b4f9204790ba5f918095c6573a7c5ee5fb747479e1917cd6ba3c8067fb6ae0c8dd835a0a9b3da911de4c2

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZE:0UzeyQMS4DqodCnoe+iitjWwwo

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      c82ee1f3076480ab8c080d83b7535495_JaffaCakes118

    • Size

      2.2MB

    • MD5

      c82ee1f3076480ab8c080d83b7535495

    • SHA1

      65b50eb05415e43c30200c5c6af7c21ace92bec0

    • SHA256

      c57382aa9fc63a52d13f5a3f124599abfd00fd3e73353eb4be88cad92861db5c

    • SHA512

      9f811755e133127e6c184db7545e84720ec2a538b30b4f9204790ba5f918095c6573a7c5ee5fb747479e1917cd6ba3c8067fb6ae0c8dd835a0a9b3da911de4c2

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZE:0UzeyQMS4DqodCnoe+iitjWwwo

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks