General

  • Target

    cfea9951aa1676e9f0e442477aa45678_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240906-tgdqtswbkh

  • MD5

    cfea9951aa1676e9f0e442477aa45678

  • SHA1

    0b6d42cef186d9aa2924b08fddec554c79a20069

  • SHA256

    baf74fb69cd326e10b503c9e76a556b5b03d09569f0f2e45632c806e0c6da449

  • SHA512

    d99bc2e5fef4d69dc70cc2b21f758250fa7e491199d4532b9c8380ec692cc705a9e310bb5d6ff96a549ab4ebaebfd25482de8e5c7bc262afc12687b74f858b77

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlb:86SIROiFJiwp0xlrlb

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      cfea9951aa1676e9f0e442477aa45678_JaffaCakes118

    • Size

      2.6MB

    • MD5

      cfea9951aa1676e9f0e442477aa45678

    • SHA1

      0b6d42cef186d9aa2924b08fddec554c79a20069

    • SHA256

      baf74fb69cd326e10b503c9e76a556b5b03d09569f0f2e45632c806e0c6da449

    • SHA512

      d99bc2e5fef4d69dc70cc2b21f758250fa7e491199d4532b9c8380ec692cc705a9e310bb5d6ff96a549ab4ebaebfd25482de8e5c7bc262afc12687b74f858b77

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlb:86SIROiFJiwp0xlrlb

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks