General

  • Target

    d48e268fa60f61a5debfbd33557badd6_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240908-rnmwzasgqf

  • MD5

    d48e268fa60f61a5debfbd33557badd6

  • SHA1

    4fe6228a8e6082aa18cd4888627fbb868eb9642a

  • SHA256

    3fcd2b8b81a62fff8325489e63386c088b480fa51d5e04eddab6937441e85941

  • SHA512

    6d409aba4698452a85b527d3453428290d2d62bbac9419e43f3cd73b754dc99c5273e0281422ad8bccc4e7441c9dfda4bc0d4074cb66854f667b87e5c65e6847

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZr:0UzeyQMS4DqodCnoe+iitjWwwv

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      d48e268fa60f61a5debfbd33557badd6_JaffaCakes118

    • Size

      2.2MB

    • MD5

      d48e268fa60f61a5debfbd33557badd6

    • SHA1

      4fe6228a8e6082aa18cd4888627fbb868eb9642a

    • SHA256

      3fcd2b8b81a62fff8325489e63386c088b480fa51d5e04eddab6937441e85941

    • SHA512

      6d409aba4698452a85b527d3453428290d2d62bbac9419e43f3cd73b754dc99c5273e0281422ad8bccc4e7441c9dfda4bc0d4074cb66854f667b87e5c65e6847

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZr:0UzeyQMS4DqodCnoe+iitjWwwv

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks