General

  • Target

    cc05c68fbba3cb2337ee135be3a31a19_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240831-b1dk3ayaqc

  • MD5

    cc05c68fbba3cb2337ee135be3a31a19

  • SHA1

    ae958e154ca994cf79ecd110c2788903c5d63872

  • SHA256

    22c2b0269eca8bee5aaa34b9bf8f227078921203798dc6fa8f5309116d2f0e59

  • SHA512

    349fa3a35b650669a8b6bdb9972bcf507e2e3f9185f5d0e68c3b0f83b33bc3c5758f4fdccc20b0d8a70af024bce0a61ee3408f28a8596798d46f9859940ae2ff

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZd:0UzeyQMS4DqodCnoe+iitjWwwJ

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      cc05c68fbba3cb2337ee135be3a31a19_JaffaCakes118

    • Size

      2.2MB

    • MD5

      cc05c68fbba3cb2337ee135be3a31a19

    • SHA1

      ae958e154ca994cf79ecd110c2788903c5d63872

    • SHA256

      22c2b0269eca8bee5aaa34b9bf8f227078921203798dc6fa8f5309116d2f0e59

    • SHA512

      349fa3a35b650669a8b6bdb9972bcf507e2e3f9185f5d0e68c3b0f83b33bc3c5758f4fdccc20b0d8a70af024bce0a61ee3408f28a8596798d46f9859940ae2ff

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZd:0UzeyQMS4DqodCnoe+iitjWwwJ

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks