General

  • Target

    f8bec2e91cd33b381efc6ec8d922f687_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240926-tqj9zazbjb

  • MD5

    f8bec2e91cd33b381efc6ec8d922f687

  • SHA1

    1babffa7da6006cd0bc8312633e35f0b81ffe2ad

  • SHA256

    caba25bea37cc34bdca6637d6edc38ed312b02fe9d82a48bab3bf9e35e2c2b51

  • SHA512

    f4fb7aee347f212a0edaa97117fc8264d7ebfe64c3c290a82eb31df10b4ab2586459cc67a9c6965f028a7a33adcefbf4c5318bddf31327aa94409082078f4706

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ5:0UzeyQMS4DqodCnoe+iitjWwwF

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      f8bec2e91cd33b381efc6ec8d922f687_JaffaCakes118

    • Size

      2.2MB

    • MD5

      f8bec2e91cd33b381efc6ec8d922f687

    • SHA1

      1babffa7da6006cd0bc8312633e35f0b81ffe2ad

    • SHA256

      caba25bea37cc34bdca6637d6edc38ed312b02fe9d82a48bab3bf9e35e2c2b51

    • SHA512

      f4fb7aee347f212a0edaa97117fc8264d7ebfe64c3c290a82eb31df10b4ab2586459cc67a9c6965f028a7a33adcefbf4c5318bddf31327aa94409082078f4706

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ5:0UzeyQMS4DqodCnoe+iitjWwwF

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks