General

  • Target

    dca1fdeab0af3e1c62b1a1f86accfdf7_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240912-t71naatgmq

  • MD5

    dca1fdeab0af3e1c62b1a1f86accfdf7

  • SHA1

    940089805e7fcc95b36a890625b557e06c44ba54

  • SHA256

    6dc32cc914d22106bb4caa5efdcf4da8c02dee28c1fd9efd58c081b36741e423

  • SHA512

    4f87412739bb2b3686f0927476d4da2db12e0603bd7097774c4514009f69ec28f21b38b4e89e6e0b54a54810fe15b3de7d34c846c1df1105d873ce44343e8467

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrla:86SIROiFJiwp0xlrla

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      dca1fdeab0af3e1c62b1a1f86accfdf7_JaffaCakes118

    • Size

      2.6MB

    • MD5

      dca1fdeab0af3e1c62b1a1f86accfdf7

    • SHA1

      940089805e7fcc95b36a890625b557e06c44ba54

    • SHA256

      6dc32cc914d22106bb4caa5efdcf4da8c02dee28c1fd9efd58c081b36741e423

    • SHA512

      4f87412739bb2b3686f0927476d4da2db12e0603bd7097774c4514009f69ec28f21b38b4e89e6e0b54a54810fe15b3de7d34c846c1df1105d873ce44343e8467

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrla:86SIROiFJiwp0xlrla

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks