General

  • Target

    cf2d44c12bff0e616d3cc259bc38c7a6_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240906-kzm8jsxfkn

  • MD5

    cf2d44c12bff0e616d3cc259bc38c7a6

  • SHA1

    a7098aae5d7a4f8379279482be35586141a6aa61

  • SHA256

    49bab81ac24c8b1148121d54596d8411aec1c8a5eb311502f8f7f737c6603a6f

  • SHA512

    0955462cebc4b19d2fc91b733fbb4863064315aeea03bdcc2c3e5a0aaa53dd2c7269066aaa3dcbf92af7f1a7da73d763819b852c88fb2835546723ce4c26ee79

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlp:86SIROiFJiwp0xlrlp

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      cf2d44c12bff0e616d3cc259bc38c7a6_JaffaCakes118

    • Size

      2.6MB

    • MD5

      cf2d44c12bff0e616d3cc259bc38c7a6

    • SHA1

      a7098aae5d7a4f8379279482be35586141a6aa61

    • SHA256

      49bab81ac24c8b1148121d54596d8411aec1c8a5eb311502f8f7f737c6603a6f

    • SHA512

      0955462cebc4b19d2fc91b733fbb4863064315aeea03bdcc2c3e5a0aaa53dd2c7269066aaa3dcbf92af7f1a7da73d763819b852c88fb2835546723ce4c26ee79

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlp:86SIROiFJiwp0xlrlp

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks