General

  • Target

    f45826e7964e15d09f762d85c59f5996_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240924-x48q9s1blm

  • MD5

    f45826e7964e15d09f762d85c59f5996

  • SHA1

    8eda7652c6f1f067ea3d78c24c1c34c26a0fa2fe

  • SHA256

    d06cc2bf6f8d4323dde9e271225e423166d63e55f4993f45a4aa0b6bf7b704d1

  • SHA512

    91bece6eeec6605222e74f11dae3c604ef5456d9317a3c8ff6c43766133a6bf41183ff74dfb753e7c3c0a31c31d5c36458967471eaccff2a8288511359c515fd

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZA:0UzeyQMS4DqodCnoe+iitjWwwk

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      f45826e7964e15d09f762d85c59f5996_JaffaCakes118

    • Size

      2.2MB

    • MD5

      f45826e7964e15d09f762d85c59f5996

    • SHA1

      8eda7652c6f1f067ea3d78c24c1c34c26a0fa2fe

    • SHA256

      d06cc2bf6f8d4323dde9e271225e423166d63e55f4993f45a4aa0b6bf7b704d1

    • SHA512

      91bece6eeec6605222e74f11dae3c604ef5456d9317a3c8ff6c43766133a6bf41183ff74dfb753e7c3c0a31c31d5c36458967471eaccff2a8288511359c515fd

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZA:0UzeyQMS4DqodCnoe+iitjWwwk

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks