General

  • Target

    81dd8d9bf855e8a2ae137a3a42c781c867f3c4747e2ed9afd3521fa720d7dff4N.exe

  • Size

    2.6MB

  • Sample

    241205-xs2htaxmh1

  • MD5

    e2a1ae15e0c7f205073f7fa3c7dbbc80

  • SHA1

    3be0b37211a23f583a797abd3f17bce6abd2f0ca

  • SHA256

    81dd8d9bf855e8a2ae137a3a42c781c867f3c4747e2ed9afd3521fa720d7dff4

  • SHA512

    ffd187f612d3a21abdefcb1e663a60597dc6ca9c433bd7d3f9140b7182a661f0d5c1fe38ec51b1160587b16351df528d31a1afdcda3acb2934317bbc17a4c1c9

  • SSDEEP

    49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlM:86SIROiFJiwp0xlrlM

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      81dd8d9bf855e8a2ae137a3a42c781c867f3c4747e2ed9afd3521fa720d7dff4N.exe

    • Size

      2.6MB

    • MD5

      e2a1ae15e0c7f205073f7fa3c7dbbc80

    • SHA1

      3be0b37211a23f583a797abd3f17bce6abd2f0ca

    • SHA256

      81dd8d9bf855e8a2ae137a3a42c781c867f3c4747e2ed9afd3521fa720d7dff4

    • SHA512

      ffd187f612d3a21abdefcb1e663a60597dc6ca9c433bd7d3f9140b7182a661f0d5c1fe38ec51b1160587b16351df528d31a1afdcda3acb2934317bbc17a4c1c9

    • SSDEEP

      49152:8coQxSBeKeiOSiFmoJggggLo40KDi3gp0XhCjyrlM:86SIROiFJiwp0xlrlM

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks