General

  • Target

    e40662ea1c085043d1f7c5deb6610b1e_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240916-e2mf5syglc

  • MD5

    e40662ea1c085043d1f7c5deb6610b1e

  • SHA1

    e24a14abb4320951fd6a6c4c0405f496a20334c9

  • SHA256

    8d69b35e4791f9d7973b3a580d24df141ed0e60a972e541259134af1316c90e8

  • SHA512

    c5fd0bd70ea18feeee3013b52d44b2bda7b9d53318f5786f08e2efbc6cd875aac27f656fbe97c78999c5349af23eb36f68693d9b5336dee7729a3285d7ce832a

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlg:86SIROiFJiwp0xlrlg

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      e40662ea1c085043d1f7c5deb6610b1e_JaffaCakes118

    • Size

      2.6MB

    • MD5

      e40662ea1c085043d1f7c5deb6610b1e

    • SHA1

      e24a14abb4320951fd6a6c4c0405f496a20334c9

    • SHA256

      8d69b35e4791f9d7973b3a580d24df141ed0e60a972e541259134af1316c90e8

    • SHA512

      c5fd0bd70ea18feeee3013b52d44b2bda7b9d53318f5786f08e2efbc6cd875aac27f656fbe97c78999c5349af23eb36f68693d9b5336dee7729a3285d7ce832a

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlg:86SIROiFJiwp0xlrlg

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks