General

  • Target

    e027f6b7ef72d7d841a18040c19d23e6_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240914-pcltestcqg

  • MD5

    e027f6b7ef72d7d841a18040c19d23e6

  • SHA1

    56f50e06d7539a35931040315c6c7368c3782fd5

  • SHA256

    25af922e38ca23cce8d0a6a258f679c2e51251fa261210e1fcf6550dfe870afd

  • SHA512

    bf074dc6585beeb91272e2cee972e4fd4817272bb1c03d92eb93151c9b32dadf0b8302e886d8264b8032c7751699846fab241e3a854ccd763666846f33f35a1f

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl5:86SIROiFJiwp0xlrl5

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      e027f6b7ef72d7d841a18040c19d23e6_JaffaCakes118

    • Size

      2.6MB

    • MD5

      e027f6b7ef72d7d841a18040c19d23e6

    • SHA1

      56f50e06d7539a35931040315c6c7368c3782fd5

    • SHA256

      25af922e38ca23cce8d0a6a258f679c2e51251fa261210e1fcf6550dfe870afd

    • SHA512

      bf074dc6585beeb91272e2cee972e4fd4817272bb1c03d92eb93151c9b32dadf0b8302e886d8264b8032c7751699846fab241e3a854ccd763666846f33f35a1f

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl5:86SIROiFJiwp0xlrl5

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.