General

  • Target

    f3756f3473a84b065799b84d3cf4c157_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240924-mqpq5a1frn

  • MD5

    f3756f3473a84b065799b84d3cf4c157

  • SHA1

    209065fe786b2f107cf2dbc7ad14f1adc83ff8f6

  • SHA256

    a82f7c57e7adea912daae5061b078869324cb8bc642470ba4d8fa374751bfab4

  • SHA512

    c4a8b41d5e946af8aae869b368e3a9000b78310e9895b4b776f2a544b5eb5e3276443b3e70522740b94ae73c722c70d149a8242d4fc30fcf82eb280699d62dbd

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZp:0UzeyQMS4DqodCnoe+iitjWww9

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      f3756f3473a84b065799b84d3cf4c157_JaffaCakes118

    • Size

      2.2MB

    • MD5

      f3756f3473a84b065799b84d3cf4c157

    • SHA1

      209065fe786b2f107cf2dbc7ad14f1adc83ff8f6

    • SHA256

      a82f7c57e7adea912daae5061b078869324cb8bc642470ba4d8fa374751bfab4

    • SHA512

      c4a8b41d5e946af8aae869b368e3a9000b78310e9895b4b776f2a544b5eb5e3276443b3e70522740b94ae73c722c70d149a8242d4fc30fcf82eb280699d62dbd

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZp:0UzeyQMS4DqodCnoe+iitjWww9

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks