General
-
Target
dc7c49c15bfd82ac6ca36f6d49726b804eeddc8f2455282c132dd804f48166f9
-
Size
2.6MB
-
Sample
240927-csmz7szgjn
-
MD5
e0f912ac3c6f5716ef684529ae43aa5c
-
SHA1
6275c5ade9d27e73f563d8247725ffa185eee66a
-
SHA256
dc7c49c15bfd82ac6ca36f6d49726b804eeddc8f2455282c132dd804f48166f9
-
SHA512
bf937734c1d33c8e3ee8a29b35bf8c1dbbae79a8e8facfb801625416b439444a7219a24b1fa147c83b9097fea232a7fa7b4c1c5eeebceaac1bac59fc024b64a3
-
SSDEEP
49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlO:86SIROiFJiwp0xlrlO
Behavioral task
behavioral1
Sample
dc7c49c15bfd82ac6ca36f6d49726b804eeddc8f2455282c132dd804f48166f9.exe
Resource
win7-20240903-en
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Targets
-
-
Target
dc7c49c15bfd82ac6ca36f6d49726b804eeddc8f2455282c132dd804f48166f9
-
Size
2.6MB
-
MD5
e0f912ac3c6f5716ef684529ae43aa5c
-
SHA1
6275c5ade9d27e73f563d8247725ffa185eee66a
-
SHA256
dc7c49c15bfd82ac6ca36f6d49726b804eeddc8f2455282c132dd804f48166f9
-
SHA512
bf937734c1d33c8e3ee8a29b35bf8c1dbbae79a8e8facfb801625416b439444a7219a24b1fa147c83b9097fea232a7fa7b4c1c5eeebceaac1bac59fc024b64a3
-
SSDEEP
49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlO:86SIROiFJiwp0xlrlO
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4