General

  • Target

    fe2273871f6f22122dd8baab0e022a02_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240929-kbkgrayflb

  • MD5

    fe2273871f6f22122dd8baab0e022a02

  • SHA1

    290d8a4aac726ca3cefb2b61bc44f97dafee7933

  • SHA256

    4993f03192431eb4be7c33638f43ef933985e66554af5adb9073d3a5fba73962

  • SHA512

    8727ce1c2fe6b58769763fcbc1e76d861fd72cbe364d4c3d0a2b3a185b396eb9d33607dfd8a4770c59ecec5c8382675202d41c0d1a53367b50a1d31324e8d6d5

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlu:86SIROiFJiwp0xlrlu

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      fe2273871f6f22122dd8baab0e022a02_JaffaCakes118

    • Size

      2.6MB

    • MD5

      fe2273871f6f22122dd8baab0e022a02

    • SHA1

      290d8a4aac726ca3cefb2b61bc44f97dafee7933

    • SHA256

      4993f03192431eb4be7c33638f43ef933985e66554af5adb9073d3a5fba73962

    • SHA512

      8727ce1c2fe6b58769763fcbc1e76d861fd72cbe364d4c3d0a2b3a185b396eb9d33607dfd8a4770c59ecec5c8382675202d41c0d1a53367b50a1d31324e8d6d5

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlu:86SIROiFJiwp0xlrlu

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks