General

  • Target

    d6f6448ba5a00873ccf944d81b7a5d39_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240909-x8hewawbmr

  • MD5

    d6f6448ba5a00873ccf944d81b7a5d39

  • SHA1

    ff3ccce9b2d1e73eef16984ad8e33498a5553c8d

  • SHA256

    e2432c5e3968dd316955b9d5ac047bc9721110b4eab3ba710c019118633a0385

  • SHA512

    575c6f09e822bb780055801c11e9d6a90e98ce52241b56c073a07a0e0a0734c48f6fbc8c5c9eec2758782318f422e4eac224b4713b89295b32b9ee672ca247d1

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl+:86SIROiFJiwp0xlrl+

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      d6f6448ba5a00873ccf944d81b7a5d39_JaffaCakes118

    • Size

      2.6MB

    • MD5

      d6f6448ba5a00873ccf944d81b7a5d39

    • SHA1

      ff3ccce9b2d1e73eef16984ad8e33498a5553c8d

    • SHA256

      e2432c5e3968dd316955b9d5ac047bc9721110b4eab3ba710c019118633a0385

    • SHA512

      575c6f09e822bb780055801c11e9d6a90e98ce52241b56c073a07a0e0a0734c48f6fbc8c5c9eec2758782318f422e4eac224b4713b89295b32b9ee672ca247d1

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl+:86SIROiFJiwp0xlrl+

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks