General

  • Target

    cf7144aa7df06e37e99470144472ecef_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240906-ns76xsvcpe

  • MD5

    cf7144aa7df06e37e99470144472ecef

  • SHA1

    9152d98826aad6b86b4db17f5f3a5f2f078d4d52

  • SHA256

    da4dd91408fd93eae4f04f8d1810deff1721b37a260879647f7a961e2d522598

  • SHA512

    e3695cb8e85af9d6fe52eb0bf89aa7220bb11c6a63e0a8f57d86fbf7aa0b236c7bf786d969837149988024726ad2981e2a983052dc40e6c17922e4c8e904b6f0

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlQ:86SIROiFJiwp0xlrlQ

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      cf7144aa7df06e37e99470144472ecef_JaffaCakes118

    • Size

      2.6MB

    • MD5

      cf7144aa7df06e37e99470144472ecef

    • SHA1

      9152d98826aad6b86b4db17f5f3a5f2f078d4d52

    • SHA256

      da4dd91408fd93eae4f04f8d1810deff1721b37a260879647f7a961e2d522598

    • SHA512

      e3695cb8e85af9d6fe52eb0bf89aa7220bb11c6a63e0a8f57d86fbf7aa0b236c7bf786d969837149988024726ad2981e2a983052dc40e6c17922e4c8e904b6f0

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlQ:86SIROiFJiwp0xlrlQ

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks