General

  • Target

    ece84bd43d962178653d566bbd20c422_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240920-fxca2szfng

  • MD5

    ece84bd43d962178653d566bbd20c422

  • SHA1

    4f1d1de2e0baafe7c173fbe84d752c3cc526a243

  • SHA256

    710029e18223c4508e784303feb490940922f308ade02440d3147d5675d571c3

  • SHA512

    ad4efa1f59f8de4886a2639be818697a16be31946fffcdffcf3e3d8a9d57d2b6003b75872c8b1a7cfda21091a6f0c455b481895b50f985bcc9bcf7a492f0d1a1

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZr:0UzeyQMS4DqodCnoe+iitjWwwH

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      ece84bd43d962178653d566bbd20c422_JaffaCakes118

    • Size

      2.2MB

    • MD5

      ece84bd43d962178653d566bbd20c422

    • SHA1

      4f1d1de2e0baafe7c173fbe84d752c3cc526a243

    • SHA256

      710029e18223c4508e784303feb490940922f308ade02440d3147d5675d571c3

    • SHA512

      ad4efa1f59f8de4886a2639be818697a16be31946fffcdffcf3e3d8a9d57d2b6003b75872c8b1a7cfda21091a6f0c455b481895b50f985bcc9bcf7a492f0d1a1

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZr:0UzeyQMS4DqodCnoe+iitjWwwH

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks