General

  • Target

    e69a344708a5adf954f5304767184ac3_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240917-mdbnqsxgrn

  • MD5

    e69a344708a5adf954f5304767184ac3

  • SHA1

    f902f62eed5ba14d1f9d3513979669cdade71b9e

  • SHA256

    79ab452039204c815215c9cdd73f28b0db81a82bd4d6098ad177126ea09b2921

  • SHA512

    7465135013c2d376dac60b40477180ca1364580fda82515d3c3d9a6803e294803a6c2ec65cc3542bdfa6c1204fd27e8fe28b2eded4d335a35728a932c89cfc86

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZO:0UzeyQMS4DqodCnoe+iitjWwwC

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      e69a344708a5adf954f5304767184ac3_JaffaCakes118

    • Size

      2.2MB

    • MD5

      e69a344708a5adf954f5304767184ac3

    • SHA1

      f902f62eed5ba14d1f9d3513979669cdade71b9e

    • SHA256

      79ab452039204c815215c9cdd73f28b0db81a82bd4d6098ad177126ea09b2921

    • SHA512

      7465135013c2d376dac60b40477180ca1364580fda82515d3c3d9a6803e294803a6c2ec65cc3542bdfa6c1204fd27e8fe28b2eded4d335a35728a932c89cfc86

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZO:0UzeyQMS4DqodCnoe+iitjWwwC

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks