General

  • Target

    da8ab1a18be8f632cbbab17c133a8c15_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240911-rrv2rawbke

  • MD5

    da8ab1a18be8f632cbbab17c133a8c15

  • SHA1

    137a02685e25fc560b90f785eb60736aab5fc145

  • SHA256

    3e7025cb57847ab826a8d84e2354339116f52092096b17963bac1ce91e5f6f12

  • SHA512

    f2e84a80f65e07f33cb70ec70345b3952759db7a4c8ecaddfd8ed75b5d53393a8388a1eced83902992196b94f4f8613c0c563193e8bd7ac7156b1d855b19f477

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlZ:86SIROiFJiwp0xlrlZ

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      da8ab1a18be8f632cbbab17c133a8c15_JaffaCakes118

    • Size

      2.6MB

    • MD5

      da8ab1a18be8f632cbbab17c133a8c15

    • SHA1

      137a02685e25fc560b90f785eb60736aab5fc145

    • SHA256

      3e7025cb57847ab826a8d84e2354339116f52092096b17963bac1ce91e5f6f12

    • SHA512

      f2e84a80f65e07f33cb70ec70345b3952759db7a4c8ecaddfd8ed75b5d53393a8388a1eced83902992196b94f4f8613c0c563193e8bd7ac7156b1d855b19f477

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlZ:86SIROiFJiwp0xlrlZ

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks