General

  • Target

    ed4a9220b8ffa35eb22949b3868ed72f_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240920-lcajlsyhlb

  • MD5

    ed4a9220b8ffa35eb22949b3868ed72f

  • SHA1

    d8e13f1a5bc9b9384d74de408b8f2c9736725386

  • SHA256

    e1b52161c2b870eac7974d421fa3d0cac9ef89a39cbd3d16ce102d023003315e

  • SHA512

    5fd451a8f7f8ea068539ce2c5ef5e182674c04e30d784ba126466bf8574e47e7f4ee354a21d4072855f93854df34f270f5ca9255dd548bee14a52ca9710ad1e9

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlu:86SIROiFJiwp0xlrlu

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      ed4a9220b8ffa35eb22949b3868ed72f_JaffaCakes118

    • Size

      2.6MB

    • MD5

      ed4a9220b8ffa35eb22949b3868ed72f

    • SHA1

      d8e13f1a5bc9b9384d74de408b8f2c9736725386

    • SHA256

      e1b52161c2b870eac7974d421fa3d0cac9ef89a39cbd3d16ce102d023003315e

    • SHA512

      5fd451a8f7f8ea068539ce2c5ef5e182674c04e30d784ba126466bf8574e47e7f4ee354a21d4072855f93854df34f270f5ca9255dd548bee14a52ca9710ad1e9

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlu:86SIROiFJiwp0xlrlu

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks