General

  • Target

    ef1a1294b1da12b778325dc880c9658b_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240921-fjnrxswcrr

  • MD5

    ef1a1294b1da12b778325dc880c9658b

  • SHA1

    de1372e4cf5da0fb7b34196a68a3cd9051767c7b

  • SHA256

    4b928d517af075ef804ac352711c5b2606cd8f0e6b7b4c66e6b8625257503174

  • SHA512

    975cd367f235ab418c7aa9dc299be9873df737b2ae164e2aa8f65125749fae87d821d93c95a9fdc94c50a51978821f5ce6cb9193f027b0874f701e279bec0456

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl4:86SIROiFJiwp0xlrl4

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      ef1a1294b1da12b778325dc880c9658b_JaffaCakes118

    • Size

      2.6MB

    • MD5

      ef1a1294b1da12b778325dc880c9658b

    • SHA1

      de1372e4cf5da0fb7b34196a68a3cd9051767c7b

    • SHA256

      4b928d517af075ef804ac352711c5b2606cd8f0e6b7b4c66e6b8625257503174

    • SHA512

      975cd367f235ab418c7aa9dc299be9873df737b2ae164e2aa8f65125749fae87d821d93c95a9fdc94c50a51978821f5ce6cb9193f027b0874f701e279bec0456

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl4:86SIROiFJiwp0xlrl4

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks