General

  • Target

    d0cb93d326a9c752b0363c9028d3e5d0_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240907-btp1hsxgnm

  • MD5

    d0cb93d326a9c752b0363c9028d3e5d0

  • SHA1

    e282f1d605f0530aa8ed3037c818524e8ccf48d4

  • SHA256

    1a774df76e807dab7e1ab89c525377e922611e6efbea3fa8c40ce09b953b0463

  • SHA512

    5cef479825bf500b65dd9a8b4a7c9c8a4e1263ab0eadd9cac95aa66bbcc618032ce67bc2bb6be8ca4f4d0f2690bee05bca8aecbe087fca47407c5cb8b8e71b11

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZl:0UzeyQMS4DqodCnoe+iitjWww5

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      d0cb93d326a9c752b0363c9028d3e5d0_JaffaCakes118

    • Size

      2.2MB

    • MD5

      d0cb93d326a9c752b0363c9028d3e5d0

    • SHA1

      e282f1d605f0530aa8ed3037c818524e8ccf48d4

    • SHA256

      1a774df76e807dab7e1ab89c525377e922611e6efbea3fa8c40ce09b953b0463

    • SHA512

      5cef479825bf500b65dd9a8b4a7c9c8a4e1263ab0eadd9cac95aa66bbcc618032ce67bc2bb6be8ca4f4d0f2690bee05bca8aecbe087fca47407c5cb8b8e71b11

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZl:0UzeyQMS4DqodCnoe+iitjWww5

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks