General

  • Target

    JaffaCakes118_0e00cfad5df21bbd9d332ff05f6f9efb

  • Size

    2.2MB

  • Sample

    250605-dtx28s1mv6

  • MD5

    0e00cfad5df21bbd9d332ff05f6f9efb

  • SHA1

    4d76ab3224d426edbb2ca87140185f90f62729f7

  • SHA256

    b359b2b27daf2b7d26e6549089a5c32245cae3fc675991c0f2ae2952d5f837f0

  • SHA512

    513278478365119ffe887cea1828bad12cfacde66e8d1ec2de06f7043e559d0d1d586a544c9c328be4df44e341c7200df76db97c24e41b9b49787b59741adc64

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ/:0UzeyQMS4DqodCnoe+iitjWwwr

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Targets

    • Target

      JaffaCakes118_0e00cfad5df21bbd9d332ff05f6f9efb

    • Size

      2.2MB

    • MD5

      0e00cfad5df21bbd9d332ff05f6f9efb

    • SHA1

      4d76ab3224d426edbb2ca87140185f90f62729f7

    • SHA256

      b359b2b27daf2b7d26e6549089a5c32245cae3fc675991c0f2ae2952d5f837f0

    • SHA512

      513278478365119ffe887cea1828bad12cfacde66e8d1ec2de06f7043e559d0d1d586a544c9c328be4df44e341c7200df76db97c24e41b9b49787b59741adc64

    • SSDEEP

      24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ/:0UzeyQMS4DqodCnoe+iitjWwwr

    • Detects Mofksys worm

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Mofksys

      Mofksys is a worm written in VisualBasic.

    • Mofksys family

    • Pony family

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks