General

  • Target

    f0496f24e3433009ed654a5614786bbc_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240921-vya7psvakp

  • MD5

    f0496f24e3433009ed654a5614786bbc

  • SHA1

    9ce9eb18698656ad3b1731340b1cb5bcd583cc12

  • SHA256

    68026aee11f3e7d3279833e079c030dd6c3c4e1496be88a572209f07b531f2f9

  • SHA512

    d6a9f7ea77c5b40225742fbfedf4ddcabe7c7197df42b6cdee3da27b8ed3c79df40d3feb537736da5a32881fcc195f23275cc1886c21060461ce72823ffa92a0

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl6:86SIROiFJiwp0xlrl6

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      f0496f24e3433009ed654a5614786bbc_JaffaCakes118

    • Size

      2.6MB

    • MD5

      f0496f24e3433009ed654a5614786bbc

    • SHA1

      9ce9eb18698656ad3b1731340b1cb5bcd583cc12

    • SHA256

      68026aee11f3e7d3279833e079c030dd6c3c4e1496be88a572209f07b531f2f9

    • SHA512

      d6a9f7ea77c5b40225742fbfedf4ddcabe7c7197df42b6cdee3da27b8ed3c79df40d3feb537736da5a32881fcc195f23275cc1886c21060461ce72823ffa92a0

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl6:86SIROiFJiwp0xlrl6

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks