General

  • Target

    5a9e8930105a7fb506dfde16af2b528e15d244ccd4f2328acf02e4088453854d

  • Size

    2.2MB

  • Sample

    241003-yjdaasxamd

  • MD5

    af0a5c64f74887e005a933f582a4d3a7

  • SHA1

    30fc6b8d786bad2fb2736e99e6c24d2f4c6dbe49

  • SHA256

    5a9e8930105a7fb506dfde16af2b528e15d244ccd4f2328acf02e4088453854d

  • SHA512

    75b4d4ab1609ce6e6ed8150a177c6a8267847914edce7ad980d2b3bf1a9b995446a5044ea65aa4a044f4036508e0f7d47c5c73bfe50e2c93edc1345c7dfc3b0d

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZR:0UzeyQMS4DqodCnoe+iitjWww1

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      5a9e8930105a7fb506dfde16af2b528e15d244ccd4f2328acf02e4088453854d

    • Size

      2.2MB

    • MD5

      af0a5c64f74887e005a933f582a4d3a7

    • SHA1

      30fc6b8d786bad2fb2736e99e6c24d2f4c6dbe49

    • SHA256

      5a9e8930105a7fb506dfde16af2b528e15d244ccd4f2328acf02e4088453854d

    • SHA512

      75b4d4ab1609ce6e6ed8150a177c6a8267847914edce7ad980d2b3bf1a9b995446a5044ea65aa4a044f4036508e0f7d47c5c73bfe50e2c93edc1345c7dfc3b0d

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZR:0UzeyQMS4DqodCnoe+iitjWww1

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks