General

  • Target

    f6e7a370a610708ca521782a0c4c8695_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240925-1fzegasbre

  • MD5

    f6e7a370a610708ca521782a0c4c8695

  • SHA1

    bc02408e63825a635ff40efa291d3ab518b51149

  • SHA256

    59cfc8b651f5e72b8386e5a6762c6f818d35cd9ffea48fae6f05329d8f91a8df

  • SHA512

    4fa81e27af350cbd0403a2aa74d9bea483f85cf52db44d1f6403a2303496a0d3535f1302715e58414060c4bb60a140efed709337a886c81035a0c39bc06d7975

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrll:86SIROiFJiwp0xlrll

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      f6e7a370a610708ca521782a0c4c8695_JaffaCakes118

    • Size

      2.6MB

    • MD5

      f6e7a370a610708ca521782a0c4c8695

    • SHA1

      bc02408e63825a635ff40efa291d3ab518b51149

    • SHA256

      59cfc8b651f5e72b8386e5a6762c6f818d35cd9ffea48fae6f05329d8f91a8df

    • SHA512

      4fa81e27af350cbd0403a2aa74d9bea483f85cf52db44d1f6403a2303496a0d3535f1302715e58414060c4bb60a140efed709337a886c81035a0c39bc06d7975

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrll:86SIROiFJiwp0xlrll

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks