General

  • Target

    e32b9cac11eb2750ed022c34fbe75531_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240915-xj48caybrq

  • MD5

    e32b9cac11eb2750ed022c34fbe75531

  • SHA1

    b66caca7ea9faba5c86941a7c45a19e9fbc2871f

  • SHA256

    27901acdb44ff9f7f4842b020f465cd76f7d1d65b2e541e20c8130415eb51b24

  • SHA512

    d494f31b694fa421f5d29b3e8b3b064c731b580d107928cdce10f98b6a001c57f53b2c9941d8272a31b0aa06af3ff1ad6bc089da0db362789de0c91d44b18cc1

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlO:86SIROiFJiwp0xlrlO

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      e32b9cac11eb2750ed022c34fbe75531_JaffaCakes118

    • Size

      2.6MB

    • MD5

      e32b9cac11eb2750ed022c34fbe75531

    • SHA1

      b66caca7ea9faba5c86941a7c45a19e9fbc2871f

    • SHA256

      27901acdb44ff9f7f4842b020f465cd76f7d1d65b2e541e20c8130415eb51b24

    • SHA512

      d494f31b694fa421f5d29b3e8b3b064c731b580d107928cdce10f98b6a001c57f53b2c9941d8272a31b0aa06af3ff1ad6bc089da0db362789de0c91d44b18cc1

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlO:86SIROiFJiwp0xlrlO

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks