General

  • Target

    ffc9f075f77c46611ed308a9dc67d688_JaffaCakes118

  • Size

    2.6MB

  • Sample

    240930-c5kqlsxhrb

  • MD5

    ffc9f075f77c46611ed308a9dc67d688

  • SHA1

    cabf51384cfa50e8548e3015815e258bbc7b4910

  • SHA256

    5a858c6b2177e86d153c476f7473efdf0b25a04d1de0206ea59cdfc4ac341e28

  • SHA512

    e044a58fe309ff9caf21de8bb162181e7d5cac3f68e61745ebcfabc933d217f9991e8f553f60575ce7efc78aeb36be89ce39ae55026719f98e0eb8090e9b8e1a

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlV:86SIROiFJiwp0xlrlV

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      ffc9f075f77c46611ed308a9dc67d688_JaffaCakes118

    • Size

      2.6MB

    • MD5

      ffc9f075f77c46611ed308a9dc67d688

    • SHA1

      cabf51384cfa50e8548e3015815e258bbc7b4910

    • SHA256

      5a858c6b2177e86d153c476f7473efdf0b25a04d1de0206ea59cdfc4ac341e28

    • SHA512

      e044a58fe309ff9caf21de8bb162181e7d5cac3f68e61745ebcfabc933d217f9991e8f553f60575ce7efc78aeb36be89ce39ae55026719f98e0eb8090e9b8e1a

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlV:86SIROiFJiwp0xlrlV

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks