General

  • Target

    dad82fc800a29e6ebd119bc393976771_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240911-vvxljatbke

  • MD5

    dad82fc800a29e6ebd119bc393976771

  • SHA1

    9c70387e452dac2024da4213e959b23110c526bd

  • SHA256

    f034ae08e5ab540fb65c0e3d40ac2134ba01b704aacfe7f72e550f6bc3838f7d

  • SHA512

    3c0a02b6f6e1d62ffc2aad3a715ad081454acdf951c77b3a4f16746e1837f5f1b5269ce3dbefca4c5915084cf75f2ba785e2eb299d9b737571ced7df51b7deb7

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl+:86SIROiFJiwp0xlrl+

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      dad82fc800a29e6ebd119bc393976771_JaffaCakes118

    • Size

      2.6MB

    • MD5

      dad82fc800a29e6ebd119bc393976771

    • SHA1

      9c70387e452dac2024da4213e959b23110c526bd

    • SHA256

      f034ae08e5ab540fb65c0e3d40ac2134ba01b704aacfe7f72e550f6bc3838f7d

    • SHA512

      3c0a02b6f6e1d62ffc2aad3a715ad081454acdf951c77b3a4f16746e1837f5f1b5269ce3dbefca4c5915084cf75f2ba785e2eb299d9b737571ced7df51b7deb7

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl+:86SIROiFJiwp0xlrl+

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks