General

  • Target

    e49fb2888495c90dd22e18ca58311d22_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240916-m226lateje

  • MD5

    e49fb2888495c90dd22e18ca58311d22

  • SHA1

    f8c26fe7697a79165c67eb8ac796f06096b15041

  • SHA256

    06b7f6ce40746511526486c6ba96a55b917b50f880410a6f90d7c8d9197a6490

  • SHA512

    d65020a3ca351c5f064771f1cc994015c04eb437839e1f9a745c86bad8af5e95e3093a4cd4d542ddb6dc0f4baf12ba0f2267371ecc606e627771824d4053f3df

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZI:0UzeyQMS4DqodCnoe+iitjWwwc

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      e49fb2888495c90dd22e18ca58311d22_JaffaCakes118

    • Size

      2.2MB

    • MD5

      e49fb2888495c90dd22e18ca58311d22

    • SHA1

      f8c26fe7697a79165c67eb8ac796f06096b15041

    • SHA256

      06b7f6ce40746511526486c6ba96a55b917b50f880410a6f90d7c8d9197a6490

    • SHA512

      d65020a3ca351c5f064771f1cc994015c04eb437839e1f9a745c86bad8af5e95e3093a4cd4d542ddb6dc0f4baf12ba0f2267371ecc606e627771824d4053f3df

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZI:0UzeyQMS4DqodCnoe+iitjWwwc

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks