General

  • Target

    d935b972f820836f8db8289704d3e1be_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240910-3j6ztszhlp

  • MD5

    d935b972f820836f8db8289704d3e1be

  • SHA1

    16e438689e0912d78586642d8eb2622f9031dc1b

  • SHA256

    d8e53fed83502a1e9c8f85347d9e2007fc457c3fd8374bc6adccb52852e27cc8

  • SHA512

    317b0b60a3c1fbfd8d64988cb70dfe7085fa78dcc2b42fcc2f1f30d2852cd0340b46a0281c694202ddb91ea2efb1df542efd5accd37faab86206b0cf02728174

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlm:86SIROiFJiwp0xlrlm

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      d935b972f820836f8db8289704d3e1be_JaffaCakes118

    • Size

      2.6MB

    • MD5

      d935b972f820836f8db8289704d3e1be

    • SHA1

      16e438689e0912d78586642d8eb2622f9031dc1b

    • SHA256

      d8e53fed83502a1e9c8f85347d9e2007fc457c3fd8374bc6adccb52852e27cc8

    • SHA512

      317b0b60a3c1fbfd8d64988cb70dfe7085fa78dcc2b42fcc2f1f30d2852cd0340b46a0281c694202ddb91ea2efb1df542efd5accd37faab86206b0cf02728174

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlm:86SIROiFJiwp0xlrlm

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks