General

  • Target

    cec8c1a779f28b921bf64787f52c6688_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240906-f85fzayhrh

  • MD5

    cec8c1a779f28b921bf64787f52c6688

  • SHA1

    8e1fa7bf020ce6073c02aa646ee54866213d7d7d

  • SHA256

    88ff634ccaeb0b2ea80e3145158e3906a9976bbbd0d89c21e4e51d6a916a789c

  • SHA512

    641a07bcf411116acc3e4296e937ba731c6094a70155292b7fc4971e0437369412e3c85810a3daf65e02dbae9d48df1aa27ea7fd71685cd4f741360a45708c99

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZS:0UzeyQMS4DqodCnoe+iitjWwwW

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      cec8c1a779f28b921bf64787f52c6688_JaffaCakes118

    • Size

      2.2MB

    • MD5

      cec8c1a779f28b921bf64787f52c6688

    • SHA1

      8e1fa7bf020ce6073c02aa646ee54866213d7d7d

    • SHA256

      88ff634ccaeb0b2ea80e3145158e3906a9976bbbd0d89c21e4e51d6a916a789c

    • SHA512

      641a07bcf411116acc3e4296e937ba731c6094a70155292b7fc4971e0437369412e3c85810a3daf65e02dbae9d48df1aa27ea7fd71685cd4f741360a45708c99

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZS:0UzeyQMS4DqodCnoe+iitjWwwW

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks