General

  • Target

    dbb3fed1ddbe1dba7915ac77f70fb445_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240912-dm4lfaybne

  • MD5

    dbb3fed1ddbe1dba7915ac77f70fb445

  • SHA1

    1fa65a682d2ccf5c961b73f8bd8670a2169aefc1

  • SHA256

    f44d696d38b639db5546aabe65b04cbc374cfe2f9d3480087c00e0afa42da137

  • SHA512

    e58ab91c2677a3ba64ec4c697bbf9392fb66030dd5bf313697b6da844b9fe8c329fc6c1f88eee3f12a1badc8b3ee997eebd775733199defde5af52fb133f7351

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlj:86SIROiFJiwp0xlrlj

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      dbb3fed1ddbe1dba7915ac77f70fb445_JaffaCakes118

    • Size

      2.6MB

    • MD5

      dbb3fed1ddbe1dba7915ac77f70fb445

    • SHA1

      1fa65a682d2ccf5c961b73f8bd8670a2169aefc1

    • SHA256

      f44d696d38b639db5546aabe65b04cbc374cfe2f9d3480087c00e0afa42da137

    • SHA512

      e58ab91c2677a3ba64ec4c697bbf9392fb66030dd5bf313697b6da844b9fe8c329fc6c1f88eee3f12a1badc8b3ee997eebd775733199defde5af52fb133f7351

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlj:86SIROiFJiwp0xlrlj

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks