General

  • Target

    fcb9e3265e0934f8013434b0984a0fc0_JaffaCakes118

  • Size

    2.2MB

  • Sample

    240928-vafsaawbql

  • MD5

    fcb9e3265e0934f8013434b0984a0fc0

  • SHA1

    cde32668b9f110910a0a8a8f551b22f376ba5a4c

  • SHA256

    69c63a6221fa5f264ff8f7de29dd06dfe91e04189666dbbd4b534d83845ad897

  • SHA512

    6316af3b12a65cd98dacc007f00416a3cb96eb6b8937fd327ad01c88f03634c2194f3fa8322978cd31e94e8bee4a5d89ce5539d15be3dec5125ab9ba9dc10b5d

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZX:0UzeyQMS4DqodCnoe+iitjWwwj

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      fcb9e3265e0934f8013434b0984a0fc0_JaffaCakes118

    • Size

      2.2MB

    • MD5

      fcb9e3265e0934f8013434b0984a0fc0

    • SHA1

      cde32668b9f110910a0a8a8f551b22f376ba5a4c

    • SHA256

      69c63a6221fa5f264ff8f7de29dd06dfe91e04189666dbbd4b534d83845ad897

    • SHA512

      6316af3b12a65cd98dacc007f00416a3cb96eb6b8937fd327ad01c88f03634c2194f3fa8322978cd31e94e8bee4a5d89ce5539d15be3dec5125ab9ba9dc10b5d

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZX:0UzeyQMS4DqodCnoe+iitjWwwj

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks