General

  • Target

    e42a04680c0aca34654217e86fe65b6e_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240916-gxydysseln

  • MD5

    e42a04680c0aca34654217e86fe65b6e

  • SHA1

    ce6a7dd22cc36c93c008023af7b795255c150b96

  • SHA256

    32cdbb3faca8e59ae3aeeb8cd933c291cd2656fe6bfabd2c02f9c5bf9c42fdfe

  • SHA512

    e9e9f3f32df33156ca3de336c5d1cd81846d1e9e0408a26b0ab7c4397162f3879878dc057c5f9b8fbc33a5d0112713b6bb59ad056101ee0b863a96bce6bcca8c

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ7:0UzeyQMS4DqodCnoe+iitjWwwX

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      e42a04680c0aca34654217e86fe65b6e_JaffaCakes118

    • Size

      2.2MB

    • MD5

      e42a04680c0aca34654217e86fe65b6e

    • SHA1

      ce6a7dd22cc36c93c008023af7b795255c150b96

    • SHA256

      32cdbb3faca8e59ae3aeeb8cd933c291cd2656fe6bfabd2c02f9c5bf9c42fdfe

    • SHA512

      e9e9f3f32df33156ca3de336c5d1cd81846d1e9e0408a26b0ab7c4397162f3879878dc057c5f9b8fbc33a5d0112713b6bb59ad056101ee0b863a96bce6bcca8c

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ7:0UzeyQMS4DqodCnoe+iitjWwwX

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks