General

  • Target

    e366bae1ef09270b613419da67383ced_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240915-1ewbesthnr

  • MD5

    e366bae1ef09270b613419da67383ced

  • SHA1

    814c24af2875383b20a7d2c8feedca3bf60eb4ef

  • SHA256

    e09e61248970b37a5ab5b33103ee0c7b25504e8bb0180cdbbba920fe868bf0ea

  • SHA512

    fb142088df037575fe7a785aec9314390ab051c91b148bd93aff54a48827d27cb4f037bcce621e211a1ec9e10d208fcb8362fc107c24d2776cb325ca8a79104b

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlb:86SIROiFJiwp0xlrlb

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      e366bae1ef09270b613419da67383ced_JaffaCakes118

    • Size

      2.6MB

    • MD5

      e366bae1ef09270b613419da67383ced

    • SHA1

      814c24af2875383b20a7d2c8feedca3bf60eb4ef

    • SHA256

      e09e61248970b37a5ab5b33103ee0c7b25504e8bb0180cdbbba920fe868bf0ea

    • SHA512

      fb142088df037575fe7a785aec9314390ab051c91b148bd93aff54a48827d27cb4f037bcce621e211a1ec9e10d208fcb8362fc107c24d2776cb325ca8a79104b

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlb:86SIROiFJiwp0xlrlb

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks