General

  • Target

    d5265f4e40096f8f8d21bc7ceff82720_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240908-1rav9axbnn

  • MD5

    d5265f4e40096f8f8d21bc7ceff82720

  • SHA1

    4dba5f3361d4063dad9664416c8ef481b4825340

  • SHA256

    7db38db60c51f0479b7bfa4186f7c61e5db8f1666c7bb187668e8f05507ff749

  • SHA512

    10f4b3d87dbb9c188c215eb2094726247c85110a6c31017085111a18abd0789f7316de5c45864f206d8f734c8d35bd3d3d5c811b65e20fca9c6f92accc5ccfd8

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl2:86SIROiFJiwp0xlrl2

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      d5265f4e40096f8f8d21bc7ceff82720_JaffaCakes118

    • Size

      2.6MB

    • MD5

      d5265f4e40096f8f8d21bc7ceff82720

    • SHA1

      4dba5f3361d4063dad9664416c8ef481b4825340

    • SHA256

      7db38db60c51f0479b7bfa4186f7c61e5db8f1666c7bb187668e8f05507ff749

    • SHA512

      10f4b3d87dbb9c188c215eb2094726247c85110a6c31017085111a18abd0789f7316de5c45864f206d8f734c8d35bd3d3d5c811b65e20fca9c6f92accc5ccfd8

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl2:86SIROiFJiwp0xlrl2

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks