General

  • Target

    cc168da10daa3b404708fa53b23b8be7_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240831-czjala1brb

  • MD5

    cc168da10daa3b404708fa53b23b8be7

  • SHA1

    0c5cf63ad20055eb13f289a41c7e75b21049b953

  • SHA256

    bc4df46b76c5f6a581ecb2374587b833b4084ef920f6f52c6dc9b3c2f2ea53b0

  • SHA512

    2cc6a889827aef562b6694fd4488ea226c04227d94a85d31e6fb254f1a97ed55641f4dad951c9eb4cc80c731fd18c4b8ec2b8f5f6f5fbed938d6af72f4de3c59

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZi:0UzeyQMS4DqodCnoe+iitjWwwG

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      cc168da10daa3b404708fa53b23b8be7_JaffaCakes118

    • Size

      2.2MB

    • MD5

      cc168da10daa3b404708fa53b23b8be7

    • SHA1

      0c5cf63ad20055eb13f289a41c7e75b21049b953

    • SHA256

      bc4df46b76c5f6a581ecb2374587b833b4084ef920f6f52c6dc9b3c2f2ea53b0

    • SHA512

      2cc6a889827aef562b6694fd4488ea226c04227d94a85d31e6fb254f1a97ed55641f4dad951c9eb4cc80c731fd18c4b8ec2b8f5f6f5fbed938d6af72f4de3c59

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZi:0UzeyQMS4DqodCnoe+iitjWwwG

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks