General

  • Target

    ea5d65d82d32e95ca313199d7efe028a_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240919-b7zrwavcml

  • MD5

    ea5d65d82d32e95ca313199d7efe028a

  • SHA1

    a1b9bc5dc0a718ccef150d6ebd0f4e673eb09a13

  • SHA256

    12230b4a9f53f1221f5b56c7128bcd7ee39e3972ae03a0fd0af0330e21df1651

  • SHA512

    052aa15cf9b4ce5fa562305a0fdb578fcabf5fa72eeeef85d9d559b5195e01f93c42f86811ddd1558c46fed8c887cee54a204cca478e156db1fc7157c6e6e516

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrly:86SIROiFJiwp0xlrly

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      ea5d65d82d32e95ca313199d7efe028a_JaffaCakes118

    • Size

      2.6MB

    • MD5

      ea5d65d82d32e95ca313199d7efe028a

    • SHA1

      a1b9bc5dc0a718ccef150d6ebd0f4e673eb09a13

    • SHA256

      12230b4a9f53f1221f5b56c7128bcd7ee39e3972ae03a0fd0af0330e21df1651

    • SHA512

      052aa15cf9b4ce5fa562305a0fdb578fcabf5fa72eeeef85d9d559b5195e01f93c42f86811ddd1558c46fed8c887cee54a204cca478e156db1fc7157c6e6e516

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrly:86SIROiFJiwp0xlrly

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks