General

  • Target

    f08b2d9edb26decf747a07166410e8d2_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240921-y6djks1glc

  • MD5

    f08b2d9edb26decf747a07166410e8d2

  • SHA1

    09211b755e799390dfbdb80b5b19fc9a9151d198

  • SHA256

    739da08c14829334b92ceece459ef1a2fc1a4dd23a1856917634bc07f8076783

  • SHA512

    5bc01e1aed5ffd8076ba87b433b391318aba5e3ace9d6d0092ed351169f64b4503539cd877dd42fb645bc6d47994e19e2a2847fc507598e4a686f86db18e0a52

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl2:86SIROiFJiwp0xlrl2

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      f08b2d9edb26decf747a07166410e8d2_JaffaCakes118

    • Size

      2.6MB

    • MD5

      f08b2d9edb26decf747a07166410e8d2

    • SHA1

      09211b755e799390dfbdb80b5b19fc9a9151d198

    • SHA256

      739da08c14829334b92ceece459ef1a2fc1a4dd23a1856917634bc07f8076783

    • SHA512

      5bc01e1aed5ffd8076ba87b433b391318aba5e3ace9d6d0092ed351169f64b4503539cd877dd42fb645bc6d47994e19e2a2847fc507598e4a686f86db18e0a52

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrl2:86SIROiFJiwp0xlrl2

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.